语言:
https://www.mozilla.org/en-US/security/advisories/mfsa2013-49/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-50/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-51/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-53/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-54/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-55/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-56/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-59/
严重性: Critical
ID: 66988
文件名: macosx_firefox_17_0_7_esr.nasl
版本: 1.15
类型: local
代理: macosx
发布时间: 2013/6/26
最近更新时间: 2022/3/29
支持的传感器: Nessus Agent, Nessus
风险因素: Critical
分数: 9.5
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2013-1686
CPE: cpe:/a:mozilla:firefox_esr
必需的 KB 项: MacOSX/Firefox/Installed
可利用: true
易利用性: Exploits are available
补丁发布日期: 2013/6/25
漏洞发布日期: 2013/6/25
CISA 已知可遭利用的漏洞到期日期: 2022/4/18
Metasploit (Firefox onreadystatechange Event DocumentViewerImpl Use After Free)
CVE: CVE-2013-1682, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686, CVE-2013-1687, CVE-2013-1690, CVE-2013-1692, CVE-2013-1693, CVE-2013-1694, CVE-2013-1697
BID: 60765, 60766, 60773, 60774, 60776, 60777, 60778, 60783, 60787