Описание
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-0779
- https://bugzilla.mozilla.org/show_bug.cgi?id=361298
- https://issues.rpath.com/browse/RPL-1081
- https://issues.rpath.com/browse/RPL-1103
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8757
- http://fedoranews.org/cms/node/2713
- http://fedoranews.org/cms/node/2728
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
- http://osvdb.org/32109
- http://rhn.redhat.com/errata/RHSA-2007-0077.html
- http://secunia.com/advisories/24205
- http://secunia.com/advisories/24238
- http://secunia.com/advisories/24287
- http://secunia.com/advisories/24290
- http://secunia.com/advisories/24293
- http://secunia.com/advisories/24320
- http://secunia.com/advisories/24328
- http://secunia.com/advisories/24333
- http://secunia.com/advisories/24342
- http://secunia.com/advisories/24343
- http://secunia.com/advisories/24384
- http://secunia.com/advisories/24393
- http://secunia.com/advisories/24395
- http://secunia.com/advisories/24437
- http://secunia.com/advisories/24455
- http://secunia.com/advisories/24457
- http://secunia.com/advisories/24650
- http://security.gentoo.org/glsa/glsa-200703-04.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
- http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
- http://www.mozilla.org/security/announce/2007/mfsa2007-04.html
- http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
- http://www.redhat.com/support/errata/RHSA-2007-0078.html
- http://www.redhat.com/support/errata/RHSA-2007-0079.html
- http://www.redhat.com/support/errata/RHSA-2007-0097.html
- http://www.redhat.com/support/errata/RHSA-2007-0108.html
- http://www.securityfocus.com/archive/1/461336/100/0/threaded
- http://www.securityfocus.com/archive/1/461809/100/0/threaded
- http://www.securityfocus.com/bid/22694
- http://www.securitytracker.com/id?1017700
- http://www.ubuntu.com/usn/usn-428-1
- http://www.vupen.com/english/advisories/2007/0718
- http://www.vupen.com/english/advisories/2008/0083
EPSS
CVE ID
Связанные уязвимости
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and ...
EPSS