Language:
https://www.mozilla.org/en-US/security/advisories/mfsa2013-63/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-64/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-65/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-66/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-67/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-68/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-69/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-70/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-71/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-72/
https://www.mozilla.org/en-US/security/known-vulnerabilities/
Severity: Critical
ID: 69278
File Name: freebsd_pkg_0998e79d005511e3905b0025905a4771.nasl
Version: 1.12
Type: local
Family: FreeBSD Local Security Checks
Published: 8/9/2013
Updated: 1/6/2021
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.5
Risk Factor: Critical
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:freebsd:freebsd:firefox, p-cpe:/a:freebsd:freebsd:linux-firefox, p-cpe:/a:freebsd:freebsd:linux-seamonkey, p-cpe:/a:freebsd:freebsd:linux-thunderbird, p-cpe:/a:freebsd:freebsd:seamonkey, p-cpe:/a:freebsd:freebsd:thunderbird, cpe:/o:freebsd:freebsd
Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/8/2013
Vulnerability Publication Date: 8/6/2013
Metasploit (Firefox toString console.time Privileged Javascript Injection)
CVE: CVE-2013-1701, CVE-2013-1702, CVE-2013-1704, CVE-2013-1705, CVE-2013-1706, CVE-2013-1707, CVE-2013-1708, CVE-2013-1709, CVE-2013-1710, CVE-2013-1711, CVE-2013-1712, CVE-2013-1713, CVE-2013-1714, CVE-2013-1715, CVE-2013-1717