Логотип exploitDog
bind:"CVE-2016-9064"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2016-9064"

Количество 10

Количество 10

ubuntu логотип

CVE-2016-9064

около 7 лет назад

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2016-9064

почти 9 лет назад

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2016-9064

около 7 лет назад

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2016-9064

около 7 лет назад

Add-on updates failed to verify that the add-on ID inside the signed p ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-pc4v-68rv-24q5

больше 3 лет назад

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

CVSS3: 5.9
EPSS: Низкий
oracle-oval логотип

ELSA-2016-2780

почти 9 лет назад

ELSA-2016-2780: firefox security update (CRITICAL)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:3014-1

почти 9 лет назад

Security update for MozillaFirefox, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:3105-1

больше 8 лет назад

Security update for MozillaFirefox, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:3080-1

больше 8 лет назад

Security update for MozillaFirefox, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:2861-1

почти 9 лет назад

Security update for MozillaFirefox, mozilla-nss

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-9064

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

CVSS3: 5.9
0%
Низкий
около 7 лет назад
redhat логотип
CVE-2016-9064

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

CVSS3: 5.3
0%
Низкий
почти 9 лет назад
nvd логотип
CVE-2016-9064

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

CVSS3: 5.9
0%
Низкий
около 7 лет назад
debian логотип
CVE-2016-9064

Add-on updates failed to verify that the add-on ID inside the signed p ...

CVSS3: 5.9
0%
Низкий
около 7 лет назад
github логотип
GHSA-pc4v-68rv-24q5

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2016-2780

ELSA-2016-2780: firefox security update (CRITICAL)

почти 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:3014-1

Security update for MozillaFirefox, mozilla-nss

почти 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:3105-1

Security update for MozillaFirefox, mozilla-nss

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2016:3080-1

Security update for MozillaFirefox, mozilla-nss

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2016:2861-1

Security update for MozillaFirefox, mozilla-nss

почти 9 лет назад

Уязвимостей на страницу