Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9v88-wfr2-2gxh

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

EPSS

Процентиль: 56%
0.00338
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

nvd
больше 16 лет назад

Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

debian
больше 16 лет назад

Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response be ...

EPSS

Процентиль: 56%
0.00338
Низкий