Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3976

Опубликовано: 29 авг. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.

РелизСтатусПримечание
devel

released

15.0+build1-0ubuntu1
hardy

ignored

end of life
lucid

released

15.0+build1-0ubuntu0.10.04.1
natty

released

15.0+build1-0ubuntu0.11.04.2
oneiric

released

15.0+build1-0ubuntu0.11.10.1
precise

released

15.0+build1-0ubuntu0.12.04.1
quantal

released

15.0+build1-0ubuntu1
raring

released

15.0+build1-0ubuntu1
saucy

released

15.0+build1-0ubuntu1
upstream

released

15.0

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

hardy

ignored

end of life
lucid

not-affected

natty

not-affected

oneiric

not-affected

precise

not-affected

quantal

not-affected

raring

not-affected

saucy

not-affected

upstream

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

ignored

end of life
natty

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

DNE

natty

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 73%
0.00776
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.

nvd
почти 13 лет назад

Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.

debian
почти 13 лет назад

Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMo ...

github
больше 3 лет назад

Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.

oracle-oval
почти 13 лет назад

ELSA-2012-1210: firefox security update (CRITICAL)

EPSS

Процентиль: 73%
0.00776
Низкий

4.3 Medium

CVSS2