Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-3984

Опубликовано: 17 дек. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8

Описание

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

hardy

ignored

end of life
intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

2.0.4+nobinonly-0ubuntu1
hardy

released

2.0.8+build1+nobinonly-0ubuntu0.8.04.1
intrepid

ignored

end of life, was needed
jaunty

released

2.0.8+build1+nobinonly-0ubuntu0.9.04.1
karmic

released

2.0.8+build1+nobinonly-0ubuntu0.9.10.1
lucid

released

2.0.8+build1+nobinonly-0ubuntu0.10.04.1
upstream

released

2.0.1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

released

1.9.0.16+nobinonly-0ubuntu0.8.04.1
intrepid

released

1.9.0.16+nobinonly-0ubuntu0.8.10.1
jaunty

released

1.9.0.16+nobinonly-0ubuntu0.9.04.1
karmic

DNE

lucid

DNE

upstream

released

1.9.0.16

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

intrepid

DNE

jaunty

released

1.9.1.6+nobinonly-0ubuntu0.9.04.1
karmic

released

1.9.1.6+nobinonly-0ubuntu0.9.10.1
lucid

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 85%
0.02583
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.

nvd
больше 15 лет назад

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.

debian
больше 15 лет назад

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey be ...

github
около 3 лет назад

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.

oracle-oval
больше 15 лет назад

ELSA-2009-1674: firefox security update (CRITICAL)

EPSS

Процентиль: 85%
0.02583
Низкий

6.8 Medium

CVSS2