Mozilla Firefox, Thunderbird, and SeaMonkey versions before specified are vulnerable to bypassing cross-site scripting protection through malformed charset attribute in OBJECT element
Reporter | Title | Published | Views | Family All 149 |
---|---|---|---|---|
UbuntuCve | CVE-2010-2768 | 7 Sep 201000:00 | – | ubuntucve |
Cvelist | CVE-2010-2768 | 9 Sep 201018:00 | – | cvelist |
CVE | CVE-2010-2768 | 9 Sep 201019:00 | – | cve |
securityvulns | Mozilla Foundation Security Advisory 2010-61 | 10 Sep 201000:00 | – | securityvulns |
securityvulns | Mozilla Firefox / Thunderbird / SeaMonkey multiple security vulnerabilities | 16 Sep 201000:00 | – | securityvulns |
Prion | Cross site scripting | 9 Sep 201019:00 | – | prion |
Mozilla | UTF-7 XSS by overriding document charset using <object> type attribute — Mozilla | 7 Sep 201000:00 | – | mozilla |
Veracode | Cross-site Scripting (XSS) | 10 Apr 202000:48 | – | veracode |
OpenVAS | CentOS Update for seamonkey CESA-2010:0680 centos4 i386 | 10 Sep 201000:00 | – | openvas |
OpenVAS | RedHat Update for thunderbird RHSA-2010:0682-01 | 10 Sep 201000:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo