4.3
CVE-2013-5593
- EPSS 0.48%
- Published 30.10.2013 10:55:04
- Last modified 11.04.2025 00:51:21
- Source security@mozilla.org
- Teams watchlist Login
- Open Login
The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
Data is provided by the National Vulnerability Database (NVD)
Mozilla ≫ Firefox ESR Version24.0.1
Mozilla ≫ Firefox ESR Version24.0.2
Mozilla ≫ Thunderbird Version <= 24.0.1
Mozilla ≫ Thunderbird Version17.0
Mozilla ≫ Thunderbird Version17.0.1
Mozilla ≫ Thunderbird Version17.0.2
Mozilla ≫ Thunderbird Version17.0.3
Mozilla ≫ Thunderbird Version17.0.4
Mozilla ≫ Thunderbird Version17.0.5
Mozilla ≫ Thunderbird Version17.0.6
Mozilla ≫ Thunderbird Version17.0.7
Mozilla ≫ Thunderbird Version17.0.8
Mozilla ≫ Thunderbird Version24.0
Mozilla ≫ Thunderbird Esr Version17.0.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.48% | 0.642 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.