语言:
https://www.mozilla.org/en-US/security/advisories/mfsa2013-01/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-02/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-03/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-06/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-07/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-08/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-13/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-14/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-18/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/
http://support.novell.com/security/cve/CVE-2012-5829.html
http://support.novell.com/security/cve/CVE-2013-0743.html
http://support.novell.com/security/cve/CVE-2013-0744.html
http://support.novell.com/security/cve/CVE-2013-0745.html
http://support.novell.com/security/cve/CVE-2013-0746.html
http://support.novell.com/security/cve/CVE-2013-0747.html
http://support.novell.com/security/cve/CVE-2013-0748.html
http://support.novell.com/security/cve/CVE-2013-0749.html
http://support.novell.com/security/cve/CVE-2013-0750.html
http://support.novell.com/security/cve/CVE-2013-0751.html
http://support.novell.com/security/cve/CVE-2013-0752.html
http://support.novell.com/security/cve/CVE-2013-0753.html
http://support.novell.com/security/cve/CVE-2013-0754.html
http://support.novell.com/security/cve/CVE-2013-0755.html
http://support.novell.com/security/cve/CVE-2013-0756.html
http://support.novell.com/security/cve/CVE-2013-0757.html
http://support.novell.com/security/cve/CVE-2013-0758.html
http://support.novell.com/security/cve/CVE-2013-0759.html
http://support.novell.com/security/cve/CVE-2013-0760.html
http://support.novell.com/security/cve/CVE-2013-0761.html
http://support.novell.com/security/cve/CVE-2013-0762.html
http://support.novell.com/security/cve/CVE-2013-0763.html
http://support.novell.com/security/cve/CVE-2013-0764.html
http://support.novell.com/security/cve/CVE-2013-0766.html
http://support.novell.com/security/cve/CVE-2013-0767.html
http://support.novell.com/security/cve/CVE-2013-0768.html
http://support.novell.com/security/cve/CVE-2013-0769.html
严重性: Critical
ID: 63626
文件名: suse_firefox-201301-8426.nasl
版本: 1.16
类型: local
代理: unix
发布时间: 2013/1/20
最近更新时间: 2021/1/19
支持的传感器: Nessus Agent, Nessus
风险因素: Critical
分数: 9.5
风险因素: Critical
基本分数: 10
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: cpe:/o:suse:suse_linux
必需的 KB 项: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2013/1/11
漏洞发布日期: 2012/11/21
Core Impact
Metasploit (Firefox 17.0.1 Flash Privileged Code Injection)
CVE: CVE-2012-5829, CVE-2013-0744, CVE-2013-0745, CVE-2013-0746, CVE-2013-0747, CVE-2013-0748, CVE-2013-0749, CVE-2013-0750, CVE-2013-0751, CVE-2013-0752, CVE-2013-0753, CVE-2013-0754, CVE-2013-0755, CVE-2013-0756, CVE-2013-0757, CVE-2013-0758, CVE-2013-0759, CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, CVE-2013-0763, CVE-2013-0764, CVE-2013-0766, CVE-2013-0767, CVE-2013-0768, CVE-2013-0769, CVE-2013-0770, CVE-2013-0771