4.3
CVE-2013-5593
- EPSS 0.48%
- Veröffentlicht 30.10.2013 10:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle security@mozilla.org
- Teams Watchlist Login
- Unerledigt Login
The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mozilla ≫ Firefox ESR Version24.0.1
Mozilla ≫ Firefox ESR Version24.0.2
Mozilla ≫ Thunderbird Version <= 24.0.1
Mozilla ≫ Thunderbird Version17.0
Mozilla ≫ Thunderbird Version17.0.1
Mozilla ≫ Thunderbird Version17.0.2
Mozilla ≫ Thunderbird Version17.0.3
Mozilla ≫ Thunderbird Version17.0.4
Mozilla ≫ Thunderbird Version17.0.5
Mozilla ≫ Thunderbird Version17.0.6
Mozilla ≫ Thunderbird Version17.0.7
Mozilla ≫ Thunderbird Version17.0.8
Mozilla ≫ Thunderbird Version24.0
Mozilla ≫ Thunderbird Esr Version17.0.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.48% | 0.642 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.