4.3
CVSSv2

CVE-2013-1709

Published: 07/08/2013 Updated: 19/09/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 23.0, Firefox ESR 17.x prior to 17.0.8, Thunderbird prior to 17.0.8, Thunderbird ESR 17.x prior to 17.0.8, and SeaMonkey prior to 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr 17.0.7

mozilla firefox esr 17.0.2

mozilla firefox esr 17.0.1

mozilla firefox esr 17.0

mozilla firefox esr 17.0.3

mozilla firefox esr 17.0.4

mozilla firefox esr 17.0.5

mozilla firefox esr 17.0.6

mozilla firefox

mozilla firefox 19.0

mozilla firefox 19.0.1

mozilla firefox 19.0.2

mozilla firefox 20.0

mozilla firefox 20.0.1

mozilla firefox 21.0

mozilla thunderbird

mozilla thunderbird 17.0.2

mozilla thunderbird 17.0

mozilla thunderbird 17.0.1

mozilla thunderbird 17.0.3

mozilla thunderbird 17.0.4

mozilla thunderbird 17.0.5

mozilla thunderbird 17.0.6

mozilla thunderbird esr 17.0.7

mozilla thunderbird esr 17.0.6

mozilla thunderbird esr 17.0

mozilla thunderbird esr 17.0.1

mozilla thunderbird esr 17.0.2

mozilla thunderbird esr 17.0.3

mozilla thunderbird esr 17.0.4

mozilla thunderbird esr 17.0.5

mozilla seamonkey 2.19

mozilla seamonkey 2.18

mozilla seamonkey 2.0

mozilla seamonkey 2.0.13

mozilla seamonkey 2.0.14

mozilla seamonkey 2.0.8

mozilla seamonkey 2.0.9

mozilla seamonkey 2.1

mozilla seamonkey 2.11

mozilla seamonkey 2.12

mozilla seamonkey 2.13

mozilla seamonkey 2.14

mozilla seamonkey 2.15

mozilla seamonkey

mozilla seamonkey 2.0.2

mozilla seamonkey 2.0.3

mozilla seamonkey 2.10

mozilla seamonkey 2.15.1

mozilla seamonkey 2.15.2

mozilla seamonkey 2.16.1

mozilla seamonkey 2.16.2

mozilla seamonkey 2.2

mozilla seamonkey 2.3.3

mozilla seamonkey 2.4

mozilla seamonkey 2.5

mozilla seamonkey 2.6.1

mozilla seamonkey 2.7

mozilla seamonkey 2.8

mozilla seamonkey 2.9

mozilla seamonkey 2.16

mozilla seamonkey 2.17

mozilla seamonkey 2.3.1

mozilla seamonkey 2.3.2

mozilla seamonkey 2.6

mozilla seamonkey 2.7.1

mozilla seamonkey 2.7.2

mozilla seamonkey 2.20

mozilla seamonkey 2.17.1

mozilla seamonkey 2.0.1

mozilla seamonkey 2.0.10

mozilla seamonkey 2.0.4

mozilla seamonkey 2.0.5

mozilla seamonkey 2.12.1

mozilla seamonkey 2.13.1

mozilla seamonkey 2.13.2

mozilla seamonkey 2.3

mozilla seamonkey 2.0.11

mozilla seamonkey 2.0.12

mozilla seamonkey 2.0.6

mozilla seamonkey 2.0.7

mozilla seamonkey 2.10.1

mozilla seamonkey 2.4.1

mozilla seamonkey 2.9.1

Vendor Advisories

Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: multiple memory safety errors, missing permission checks and other implementation errors may lead to the execution of arbitrary code, cross-site scripting, privilege escalation, bypass of the same-origin policy or the installation of maliciou ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Several security issues were fixed in Thunderbird ...
This update provides compatible packages for Firefox 23 ...
Mozilla Foundation Security Advisory 2013-68 Document URI misrepresentation and masquerading Announced August 6, 2013 Reporter moz_bug_r_a4 Impact High Products Firefox, Firefox ESR, SeaMonkey, Thunderbird, Thunderbird ESR ...
Mozilla Firefox before 230, Firefox ESR 17x before 1708, Thunderbird before 1708, Thunderbird ESR 17x before 1708, and SeaMonkey before 220 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative locatio ...