Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-3670

Опубликовано: 31 янв. 2012
Источник: redhat
CVSS2: 2.9
EPSS Низкий

Описание

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=785464Mozilla: Same-origin bypass using IPv6-like hostname syntax (MFSA 2012-02)

EPSS

Процентиль: 72%
0.00725
Низкий

2.9 Low

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

nvd
больше 13 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

debian
больше 13 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before ...

github
больше 3 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

oracle-oval
больше 13 лет назад

ELSA-2012-0080: thunderbird security update (CRITICAL)

EPSS

Процентиль: 72%
0.00725
Низкий

2.9 Low

CVSS2