Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-2751

Опубликовано: 20 июл. 2010
Источник: redhat
CVSS2: 2.6

Описание

The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxAffected
Red Hat Enterprise Linux Extended Update Support 4.8firefoxAffected
Red Hat Enterprise Linux Extended Update Support 5.5firefoxAffected
Red Hat Enterprise Linux 3seamonkeyFixedRHSA-2010:054621.07.2010
Red Hat Enterprise Linux 4seamonkeyFixedRHSA-2010:054621.07.2010
Red Hat Enterprise Linux 4firefoxFixedRHSA-2010:054721.07.2010
Red Hat Enterprise Linux 5firefoxFixedRHSA-2010:054721.07.2010
Red Hat Enterprise Linux 5xulrunnerFixedRHSA-2010:054721.07.2010

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=615480Mozilla SSL spoofing with history.back() and history.forward()

2.6 Low

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.

nvd
больше 15 лет назад

The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.

debian
больше 15 лет назад

The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocS ...

github
больше 3 лет назад

The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.

oracle-oval
больше 15 лет назад

ELSA-2010-0547: firefox security update (CRITICAL)

2.6 Low

CVSS2