Mozilla Firefox, Thunderbird, and SeaMonkey before specific versions do not handle certain modal calls properly, potentially allowing remote attackers to bypass the Same Origin Policy via a crafted HTML document
Reporter | Title | Published | Views | Family All 156 |
---|---|---|---|---|
securityvulns | Mozilla Foundation Security Advisory 2010-69 | 23 Oct 201000:00 | β | securityvulns |
securityvulns | Mozilla Firefox / Thunderbird / Seamonkey / NSS multiple security vulnerabilities | 23 Oct 201000:00 | β | securityvulns |
Veracode | Same-Origin Policy Bypass | 10 Apr 202000:50 | β | veracode |
seebug.org | Mozilla Firefox Modalθ°η¨θ·¨εδΏ‘ζ―ζ³ι²ζΌζ΄ | 26 Oct 201000:00 | β | seebug |
NVD | CVE-2010-3178 | 21 Oct 201019:00 | β | nvd |
Prion | Design/Logic Flaw | 21 Oct 201019:00 | β | prion |
Cvelist | CVE-2010-3178 | 21 Oct 201018:12 | β | cvelist |
CVE | CVE-2010-3178 | 21 Oct 201019:00 | β | cve |
Mozilla | Cross-site information disclosure via modal calls β Mozilla | 19 Oct 201000:00 | β | mozilla |
OpenVAS | Ubuntu: Security Advisory (USN-998-1) | 22 Oct 201000:00 | β | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo