Certificate spoofing vulnerability in the address bar in Mozilla Firefox, Thunderbird and SeaMonkey via a crafted web page (Mac OS X)ID: oval:org.secpod.oval:def:6900 | Date: (C)2012-09-06 (M)2023-11-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 and is prone to a certificate spoofing vulnerability. A flaw is present in the applications, which fail to properly handle onLocationChange events during navigation between different https sites. Successful exploitation could allow attackers to spoof the X.509 certificate information in the address bar.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Product: |
Mozilla SeaMonkey |
Mozilla Firefox |