Search for vulnerabilities
Vulnerability details: VCID-tbpd-qjup-tue4
Vulnerability ID VCID-tbpd-qjup-tue4
Aliases CVE-2013-1692
Summary Security researcher Johnathan Kuskos reported that Firefox is sending data in the body of XMLHttpRequest (XHR) HEAD requests, which goes agains the XHR specification. This can potentially be used for Cross-Site Request Forgery (CSRF) attacks against sites which do not distinguish between HEAD and POST requests.In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
epss 0.00728 https://api.first.org/data/v1/epss?cve=CVE-2013-1692
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2013-54
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.71725
EPSS Score 0.00728
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:10:22.339577+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2013/mfsa2013-54.md 37.0.0