CVE-2008-5913 — Mozilla Seamonkey vulnerability
Severity
5.8MEDIUMNVD
NVD5.0NVD4.9CNA4.9OSV4.9
EPSS
0.4%
top 37.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 20
Latest updateMay 17
Description
The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
CVSS vector
AV:N/AC:M/C:P/I:P/A:NExploitability: 6.8 | Impact: 4.9
Affected Packages3 packages
🔴Vulnerability Details
9GHSA
▶
GHSA▶
GHSA-83cp-2h62-q83c: The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3↗2022-05-17
📋Vendor Advisories
7Ubuntu▶
ant, apturl, Epiphany, gluezilla, gnome-python-extras, liferea, mozvoikko, OpenJDK, packagekit, ubufox, webfav, yelp update↗2010-07-23