9.3
CVSSv2

CVE-2013-0756

Published: 13/01/2013 Updated: 10/08/2020
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox prior to 18.0, Firefox ESR 17.x prior to 17.0.2, Thunderbird prior to 17.0.2, Thunderbird ESR 17.x prior to 17.0.2, and SeaMonkey prior to 2.15 allows remote malicious users to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla firefox esr

mozilla seamonkey

mozilla thunderbird

mozilla thunderbird esr

opensuse opensuse 11.4

opensuse opensuse 12.1

opensuse opensuse 12.2

suse linux enterprise desktop 10

suse linux enterprise desktop 11

suse linux enterprise server 10

suse linux enterprise server 11

suse linux enterprise software development kit 10

suse linux enterprise software development kit 11

canonical ubuntu linux 10.04

canonical ubuntu linux 11.10

canonical ubuntu linux 12.04

canonical ubuntu linux 12.10

Vendor Advisories

USN-1681-1 introduced a regression in Firefox ...
USN-1681-1 introduced a regression in Firefox ...
Several security issues were fixed in Firefox ...
Several security issues were fixed in Thunderbird ...
Mozilla Foundation Security Advisory 2013-19 Use-after-free in Javascript Proxy objects Announced January 8, 2013 Reporter regenrecht Impact Critical Products Firefox, Firefox ESR, SeaMonkey, Thunderbird, Thunderbird ESR ...