CVE-2014-1510
critical-risk
Published 2014-03-19
The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
Do I need to act?
!
71.1% chance of exploitation in next 30 days
EPSS score — higher than 29% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
References (28)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0310.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0316.html
Third Party Advisory
http://www.debian.org/security/2014/dsa-2881
Third Party Advisory
http://www.debian.org/security/2014/dsa-2911
Vendor Advisory
http://www.mozilla.org/security/announce/2014/mfsa2014-29.html
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Third Party Advisory
http://www.securityfocus.com/bid/66206
Third Party Advisory
http://www.ubuntu.com/usn/USN-2151-1
Third Party Advisory
https://security.gentoo.org/glsa/201504-01
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0310.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0316.html
and 8 more references
79
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
26/34 · High
Exposure
21/34 · High