Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-3670

Опубликовано: 31 янв. 2012
Источник: redhat
CVSS2: 2.9

Описание

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=785464Mozilla: Same-origin bypass using IPv6-like hostname syntax (MFSA 2012-02)

2.9 Low

CVSS2

Связанные уязвимости

ubuntu
почти 14 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

nvd
почти 14 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

debian
почти 14 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before ...

github
больше 3 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

oracle-oval
почти 14 лет назад

ELSA-2012-0080: thunderbird security update (CRITICAL)

2.9 Low

CVSS2