Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-1481 | First vendor Publication | 2014-02-06 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N | |||
---|---|---|---|
Overall CVSS Score | 7.5 | ||
Base Score | 7.5 | Environmental Score | 7.5 |
impact SubScore | 3.6 | Temporal Score | 7.5 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | High | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:22218 | |||
Oval ID: | oval:org.mitre.oval:def:22218 | ||
Title: | USN-2102-1 -- firefox vulnerabilities | ||
Description: | Firefox could be made to crash or run programs as your login if it opened a malicious website. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2102-1 CVE-2014-1477 CVE-2014-1478 CVE-2014-1479 CVE-2014-1480 CVE-2014-1482 CVE-2014-1483 CVE-2014-1485 CVE-2014-1486 CVE-2014-1487 CVE-2014-1489 CVE-2014-1488 CVE-2014-1490 CVE-2014-1491 CVE-2014-1481 | Version: | 5 |
Platform(s): | Ubuntu 13.10 Ubuntu 12.10 Ubuntu 12.04 | Product(s): | firefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23732 | |||
Oval ID: | oval:org.mitre.oval:def:23732 | ||
Title: | USN-2102-2 -- firefox regression | ||
Description: | USN-2102-1 introduced a regression in Firefox. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2102-2 CVE-2014-1477 CVE-2014-1478 CVE-2014-1479 CVE-2014-1480 CVE-2014-1482 CVE-2014-1483 CVE-2014-1485 CVE-2014-1486 CVE-2014-1487 CVE-2014-1489 CVE-2014-1488 CVE-2014-1490 CVE-2014-1491 CVE-2014-1481 | Version: | 5 |
Platform(s): | Ubuntu 13.10 Ubuntu 12.10 Ubuntu 12.04 | Product(s): | firefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24030 | |||
Oval ID: | oval:org.mitre.oval:def:24030 | ||
Title: | Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines | ||
Description: | Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-1481 | Version: | 8 |
Platform(s): | Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Firefox ESR Mozilla SeaMonkey Mozilla Thunderbird |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-02-06 | IAVM : 2014-A-0021 - Multiple Vulnerabilities in Mozilla Products Severity : Category I - VMSKEY : V0043921 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-04-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201504-01.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-119.nasl - Type : ACT_GATHER_INFO |
2014-03-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-2083.nasl - Type : ACT_GATHER_INFO |
2014-02-20 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2119-1.nasl - Type : ACT_GATHER_INFO |
2014-02-20 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2102-2.nasl - Type : ACT_GATHER_INFO |
2014-02-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_firefox-201402-140207.nasl - Type : ACT_GATHER_INFO |
2014-02-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2858.nasl - Type : ACT_GATHER_INFO |
2014-02-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2102-1.nasl - Type : ACT_GATHER_INFO |
2014-02-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-2041.nasl - Type : ACT_GATHER_INFO |
2014-02-06 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2014-0133.nasl - Type : ACT_GATHER_INFO |
2014-02-06 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2014-0132.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2014-0132.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2014-0133.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0132.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0133.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Windows host contains a web browser that is potentially affected b... File : seamonkey_2_24.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140204_firefox_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140204_thunderbird_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Windows host contains a mail client that is potentially affected b... File : mozilla_thunderbird_24_3.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Windows host contains a web browser that is potentially affected b... File : mozilla_firefox_27.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Windows host contains a web browser that is potentially affected b... File : mozilla_firefox_24_3_esr.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Mac OS X host contains a mail client that is potentially affected ... File : macosx_thunderbird_24_3.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Mac OS X host contains a web browser that is potentially affected ... File : macosx_firefox_27.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Mac OS X host contains a web browser that is potentially affected ... File : macosx_firefox_24_3_esr.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_1753f0ff8dd511e39b45b4b52fce4ce8.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-02-07 01:28:22 |
|
2024-11-28 12:39:21 |
|
2024-11-01 01:26:50 |
|
2024-10-22 12:26:31 |
|
2024-08-02 12:27:13 |
|
2024-08-02 01:08:06 |
|
2024-02-14 13:28:18 |
|
2024-02-10 01:24:17 |
|
2024-02-02 01:26:27 |
|
2024-02-01 12:07:48 |
|
2023-09-05 12:25:02 |
|
2023-09-05 01:07:42 |
|
2023-09-02 12:25:01 |
|
2023-09-02 01:07:49 |
|
2023-08-12 12:27:16 |
|
2023-08-12 01:07:19 |
|
2023-08-11 12:23:09 |
|
2023-08-11 01:07:30 |
|
2023-08-06 12:22:31 |
|
2023-08-06 01:07:17 |
|
2023-08-04 12:22:33 |
|
2023-08-04 01:07:21 |
|
2023-07-14 12:22:31 |
|
2023-07-14 01:07:20 |
|
2023-04-01 01:19:02 |
|
2023-03-29 01:24:26 |
|
2023-03-28 12:07:41 |
|
2022-10-11 12:20:19 |
|
2022-10-11 01:07:29 |
|
2022-04-26 01:17:08 |
|
2021-05-04 12:32:13 |
|
2021-04-22 01:38:58 |
|
2020-10-14 01:10:45 |
|
2020-10-03 01:10:51 |
|
2020-08-11 17:22:47 |
|
2020-05-29 01:09:54 |
|
2020-05-23 01:51:09 |
|
2020-05-23 00:39:54 |
|
2019-06-25 12:05:58 |
|
2019-01-31 12:02:16 |
|
2019-01-30 12:05:55 |
|
2018-12-04 12:05:38 |
|
2018-08-02 01:03:46 |
|
2018-06-29 12:02:17 |
|
2018-01-18 12:05:54 |
|
2018-01-03 09:21:56 |
|
2017-11-22 12:05:53 |
|
2017-11-21 12:05:02 |
|
2016-12-22 09:23:35 |
|
2016-10-04 09:24:01 |
|
2016-06-30 21:37:16 |
|
2016-06-28 22:35:13 |
|
2016-04-27 00:14:17 |
|
2015-04-09 13:28:42 |
|
2014-06-14 13:37:01 |
|
2014-04-01 14:40:57 |
|
2014-03-18 13:24:10 |
|
2014-03-18 13:21:32 |
|
2014-03-06 13:25:01 |
|
2014-02-21 13:23:43 |
|
2014-02-21 13:21:10 |
|
2014-02-19 13:21:56 |
|
2014-02-17 11:25:12 |
|
2014-02-14 17:21:42 |
|
2014-02-14 17:19:03 |
|
2014-02-10 21:23:50 |
|
2014-02-06 21:21:13 |
|
2014-02-06 13:19:29 |
|