語系:
https://www.mozilla.org/en-US/security/advisories/mfsa2013-01/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-02/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-03/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-06/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-07/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-08/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-18/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-13/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-14/
https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/
http://support.novell.com/security/cve/CVE-2012-5829.html
https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/
http://support.novell.com/security/cve/CVE-2013-0743.html
http://support.novell.com/security/cve/CVE-2013-0744.html
http://support.novell.com/security/cve/CVE-2013-0745.html
http://support.novell.com/security/cve/CVE-2013-0746.html
http://support.novell.com/security/cve/CVE-2013-0747.html
http://support.novell.com/security/cve/CVE-2013-0748.html
http://support.novell.com/security/cve/CVE-2013-0749.html
http://support.novell.com/security/cve/CVE-2013-0750.html
http://support.novell.com/security/cve/CVE-2013-0751.html
http://support.novell.com/security/cve/CVE-2013-0752.html
http://support.novell.com/security/cve/CVE-2013-0753.html
http://support.novell.com/security/cve/CVE-2013-0754.html
http://support.novell.com/security/cve/CVE-2013-0755.html
http://support.novell.com/security/cve/CVE-2013-0756.html
http://support.novell.com/security/cve/CVE-2013-0757.html
http://support.novell.com/security/cve/CVE-2013-0758.html
http://support.novell.com/security/cve/CVE-2013-0759.html
http://support.novell.com/security/cve/CVE-2013-0760.html
http://support.novell.com/security/cve/CVE-2013-0761.html
http://support.novell.com/security/cve/CVE-2013-0762.html
http://support.novell.com/security/cve/CVE-2013-0763.html
http://support.novell.com/security/cve/CVE-2013-0764.html
http://support.novell.com/security/cve/CVE-2013-0766.html
http://support.novell.com/security/cve/CVE-2013-0767.html
http://support.novell.com/security/cve/CVE-2013-0768.html
http://support.novell.com/security/cve/CVE-2013-0769.html
嚴重性: Critical
ID: 63626
檔案名稱: suse_firefox-201301-8426.nasl
版本: 1.16
類型: local
代理程式: unix
發布日期: 2013/1/20
更新日期: 2021/1/19
支援的感應器: Nessus Agent
風險因素: Critical
分數: 9.5
風險因素: Critical
基本分數: 10
媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: cpe:/o:suse:suse_linux
必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2013/1/11
弱點發布日期: 2012/11/21
Core Impact
Metasploit (Firefox 17.0.1 Flash Privileged Code Injection)
CVE: CVE-2012-5829, CVE-2013-0744, CVE-2013-0745, CVE-2013-0746, CVE-2013-0747, CVE-2013-0748, CVE-2013-0749, CVE-2013-0750, CVE-2013-0751, CVE-2013-0752, CVE-2013-0753, CVE-2013-0754, CVE-2013-0755, CVE-2013-0756, CVE-2013-0757, CVE-2013-0758, CVE-2013-0759, CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, CVE-2013-0763, CVE-2013-0764, CVE-2013-0766, CVE-2013-0767, CVE-2013-0768, CVE-2013-0769, CVE-2013-0770, CVE-2013-0771