mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
113 lines
3.6 KiB
JSON
113 lines
3.6 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2013-5601",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-100.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-100.html"
|
|
},
|
|
{
|
|
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=916685",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=916685"
|
|
},
|
|
{
|
|
"name" : "DSA-2788",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2013/dsa-2788"
|
|
},
|
|
{
|
|
"name" : "DSA-2797",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2013/dsa-2797"
|
|
},
|
|
{
|
|
"name" : "GLSA-201504-01",
|
|
"refsource" : "GENTOO",
|
|
"url" : "https://security.gentoo.org/glsa/201504-01"
|
|
},
|
|
{
|
|
"name" : "RHSA-2013:1476",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1476.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2013:1480",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1480.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2013:1634",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SU-2013:1678",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2013:1633",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:18495",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18495"
|
|
}
|
|
]
|
|
}
|
|
}
|