9.3
CVSSv2

CVE-2013-1724

Published: 18/09/2013 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox prior to 24.0, Thunderbird prior to 24.0, and SeaMonkey prior to 2.21 allows remote malicious users to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla seamonkey 2.14

mozilla seamonkey 2.13

mozilla seamonkey 2.12

mozilla seamonkey 2.11

mozilla seamonkey 2.1

mozilla seamonkey 2.0.9

mozilla seamonkey 2.0.8

mozilla seamonkey 2.0.14

mozilla seamonkey 2.0.13

mozilla seamonkey 2.0

mozilla seamonkey

mozilla seamonkey 2.19

mozilla seamonkey 2.17.1

mozilla seamonkey 2.17

mozilla seamonkey 2.16

mozilla seamonkey 2.15

mozilla seamonkey 2.10

mozilla seamonkey 2.0.3

mozilla seamonkey 2.0.2

mozilla seamonkey 2.20

mozilla seamonkey 2.18

mozilla seamonkey 2.16.2

mozilla seamonkey 2.16.1

mozilla seamonkey 2.15.1

mozilla seamonkey 2.13.2

mozilla seamonkey 2.13.1

mozilla seamonkey 2.12.1

mozilla seamonkey 2.0.5

mozilla seamonkey 2.0.4

mozilla seamonkey 2.0.10

mozilla seamonkey 2.0.1

mozilla seamonkey 2.15.2

mozilla seamonkey 2.10.1

mozilla seamonkey 2.0.7

mozilla seamonkey 2.0.6

mozilla seamonkey 2.0.12

mozilla seamonkey 2.0.11

mozilla firefox 19.0.1

mozilla firefox 19.0

mozilla firefox 19.0.2

mozilla firefox

mozilla firefox 23.0

mozilla firefox 20.0.1

mozilla firefox 20.0

mozilla firefox 22.0

mozilla firefox 21.0

mozilla thunderbird 17.0

mozilla thunderbird 17.0.6

mozilla thunderbird 17.0.7

mozilla thunderbird 17.0.4

mozilla thunderbird 17.0.5

mozilla thunderbird 17.0.1

mozilla thunderbird 17.0.2

mozilla thunderbird 17.0.3

mozilla thunderbird 17.0.8

mozilla thunderbird

Vendor Advisories

Several security issues were fixed in Thunderbird ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2013-81 Use-after-free with select element Announced September 17, 2013 Reporter Scott Bell Impact Critical Products Firefox, SeaMonkey, Thunderbird Fixed in ...
Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox before 240, Thunderbird before 240, and SeaMonkey before 221 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element ...