Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m3hq-4m6f-jcr6

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.

Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.

EPSS

Процентиль: 83%
0.01951
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.

redhat
больше 13 лет назад

Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.

nvd
больше 13 лет назад

Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.

debian
больше 13 лет назад

Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey be ...

EPSS

Процентиль: 83%
0.01951
Низкий