4.3
CVE-2013-5593
- EPSS 0.48%
- Veröffentlicht 30.10.2013 10:55:04
- Zuletzt bearbeitet 25.11.2025 17:50:16
- Quelle security@mozilla.org
- CVE-Watchlists
- Unerledigt
The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mozilla ≫ Thunderbird Version <= 24.0.1
Mozilla ≫ Thunderbird Version17.0
Mozilla ≫ Thunderbird Version17.0.1
Mozilla ≫ Thunderbird Version17.0.2
Mozilla ≫ Thunderbird Version17.0.3
Mozilla ≫ Thunderbird Version17.0.4
Mozilla ≫ Thunderbird Version17.0.5
Mozilla ≫ Thunderbird Version17.0.6
Mozilla ≫ Thunderbird Version17.0.7
Mozilla ≫ Thunderbird Version17.0.8
Mozilla ≫ Thunderbird Version24.0
Mozilla ≫ Thunderbird Esr Version17.0.9
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.48% | 0.642 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.