Search for vulnerabilities
Vulnerability ID | VCID-6yu6-djb1-sfbn |
Aliases |
CVE-2013-1737
|
Summary | Mozilla developer Boris Zbarsky reported that user-defined getters on DOM proxies would incorrectly get the expando object as this. It is unlikely that this is directly exploitable but could lead to JavaScript client or add-on code making incorrect security sensitive decisions based on hacker supplied values. In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 0.0 |
Risk | None |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1737.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2013-1737 | ||
1009041 | https://bugzilla.redhat.com/show_bug.cgi?id=1009041 | |
CVE-2013-1737 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737 | |
mfsa2013-91 | https://www.mozilla.org/en-US/security/advisories/mfsa2013-91 | |
RHSA-2013:1268 | https://access.redhat.com/errata/RHSA-2013:1268 | |
RHSA-2013:1269 | https://access.redhat.com/errata/RHSA-2013:1269 | |
USN-1951-1 | https://usn.ubuntu.com/1951-1/ | |
USN-1952-1 | https://usn.ubuntu.com/1952-1/ |
Percentile | 0.60929 |
EPSS Score | 0.00418 |
Published At | July 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:10:17.779207+00:00 | Mozilla Importer | Import | https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2013/mfsa2013-91.md | 37.0.0 |