Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-0059

Опубликовано: 02 мар. 2011
Источник: debian
EPSS Низкий

Описание

Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
icedovefixed3.0.11-2package
icedoveend-of-lifelennypackage
xulrunnerremovedpackage
xulrunnerfixed1.9.0.19-8lennypackage
iceweaselfixed3.5.17-1package
iceweaselnot-affectedlennypackage
iceapefixed2.0.12-1package
iceapenot-affectedlennypackage

Примечания

  • xulrunner in wheezy is not covered by security support

EPSS

Процентиль: 50%
0.00263
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.

redhat
больше 14 лет назад

Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.

nvd
больше 14 лет назад

Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.

github
около 3 лет назад

Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.

oracle-oval
больше 14 лет назад

ELSA-2011-0310: firefox security and bug fix update (CRITICAL)

EPSS

Процентиль: 50%
0.00263
Низкий