语言:
https://bugzilla.novell.com/show_bug.cgi?id=813026
https://bugzilla.novell.com/show_bug.cgi?id=814101
https://bugzilla.novell.com/show_bug.cgi?id=825935
https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html
严重性: Critical
ID: 75081
文件名: openSUSE-2013-574.nasl
版本: 1.7
类型: local
代理: unix
发布时间: 2014/6/13
最近更新时间: 2022/3/29
支持的传感器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
风险因素: Critical
分数: 9.5
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:opensuse:seamonkey, p-cpe:/a:novell:opensuse:seamonkey-debuginfo, p-cpe:/a:novell:opensuse:seamonkey-debugsource, p-cpe:/a:novell:opensuse:seamonkey-dom-inspector, p-cpe:/a:novell:opensuse:seamonkey-irc, p-cpe:/a:novell:opensuse:seamonkey-translations-common, p-cpe:/a:novell:opensuse:seamonkey-translations-other, p-cpe:/a:novell:opensuse:seamonkey-venkman, cpe:/o:novell:opensuse:12.2, cpe:/o:novell:opensuse:12.3
必需的 KB 项: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2013/7/4
CISA 已知可遭利用的漏洞到期日期: 2022/4/18
Metasploit (Firefox onreadystatechange Event DocumentViewerImpl Use After Free)
CVE: CVE-2013-0788, CVE-2013-0789, CVE-2013-0792, CVE-2013-0793, CVE-2013-0794, CVE-2013-0795, CVE-2013-0796, CVE-2013-0800, CVE-2013-1682, CVE-2013-1683, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686, CVE-2013-1687, CVE-2013-1688, CVE-2013-1690, CVE-2013-1692, CVE-2013-1693, CVE-2013-1694, CVE-2013-1695, CVE-2013-1696, CVE-2013-1697, CVE-2013-1698, CVE-2013-1699