The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.mozilla.org/security/announce/2010/mfsa2010-45.html - Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=536466 - Exploit | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11688 - |
Information
Published : 2010-07-30 20:30
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2751
Mitre link : CVE-2010-2751
CVE.ORG link : CVE-2010-2751
JSON object : View
Products Affected
mozilla
- seamonkey
- firefox
CWE
CWE-264
Permissions, Privileges, and Access Controls