CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
99.8%
Versions of SeaMonkey 2.14.x are potentially affected by the following security issues :
Multiple, unspecified use-after-free, out-of-bounds read and buffer overflow errors exist. (CVE-2012-5829, CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771)
Two intermediate certificates were improperly issued by TURKTRUST certificate authority. (CVE-2013-0743)
A use-after-free error exists related to displaying HTML tables with many columns and column groups. (CVE-2013-0744)
An error exists related to the βAutoWrapperChangerβ class that does not properly manage objects during garbage collection. (CVE-2012-0745)
An error exists related to βjsvalβ, βquickstubsβ, and compartmental mismatches that can lead potentially exploitable crashes. (CVE-2013-0746)
Errors exist related to events in the plugin handler that can allow same-origin policy bypass. (CVE-2013-0747)
An error related to the βtoStringβ method of XBL objects can lead to address information leakage. (CVE-2013-0748)
An unspecified memory corruption issue exists. (CVE-2013-0749, CVE-2013-0769, CVE-2013-0770)
A buffer overflow exists related to JavaScript string concatenation. (CVE-2013-0750)
An error exists related to multiple XML bindings with SVG content, contained in XBL files. (CVE-2013-0752)
A use-after-free error exists related to βXMLSerializerβ and βserializeToStreamβ. (CVE-2013-0753)
A use-after-free error exists related to garbage collection and βListenManagerβ. (CVE-2013-0754)
A use-after-free error exists related to the βVibrateβ library and βdomDocβ. (CVE-2013-0755)
A use-after-free error exists related to JavaScript βProxyβ objects. (CVE-2013-0756)
βChrome Object Wrappersβ (COW) can be bypassed by changing object prototypes and can allow arbitrary code execution. (CVE-2013-0757)
An error related to SVG elements and plugins can allow privilege escalation. (CVE-2013-0758)
An error exists related to the address bar that can allow URL spoofing attacks. (CVE-2013-0759)
An error exists related to SSL and threading that can result in potentially exploitable crashes. (CVE-2013-0764)
An error exists related to βCanvasβ and bad height or width values passed to it from HTML. (CVE-2013-0768)
Binary data 6670.prm
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770
www.mozilla.org/security/announce/2012/mfsa2013-01.html
www.mozilla.org/security/announce/2012/mfsa2013-02.html
www.mozilla.org/security/announce/2012/mfsa2013-03.html
www.mozilla.org/security/announce/2012/mfsa2013-04.html
www.mozilla.org/security/announce/2012/mfsa2013-05.html
www.mozilla.org/security/announce/2012/mfsa2013-06.html
www.mozilla.org/security/announce/2012/mfsa2013-07.html
www.mozilla.org/security/announce/2012/mfsa2013-08.html
www.mozilla.org/security/announce/2012/mfsa2013-09.html
www.mozilla.org/security/announce/2012/mfsa2013-10.html
www.mozilla.org/security/announce/2012/mfsa2013-11.html
www.mozilla.org/security/announce/2012/mfsa2013-12.html
www.mozilla.org/security/announce/2012/mfsa2013-13.html
www.mozilla.org/security/announce/2012/mfsa2013-14.html
www.mozilla.org/security/announce/2012/mfsa2013-15.html
www.mozilla.org/security/announce/2012/mfsa2013-16.html
www.mozilla.org/security/announce/2012/mfsa2013-17.html
www.mozilla.org/security/announce/2012/mfsa2013-18.html
www.mozilla.org/security/announce/2012/mfsa2013-19.html
www.mozilla.org/security/announce/2012/mfsa2013-20.html