Lucene search

K
cveMitreCVE-2010-1213
HistoryJul 30, 2010 - 8:30 p.m.

CVE-2010-1213

2010-07-3020:30:01
CWE-20
mitre
web.nvd.nist.gov
61
nvd
cve-2010-1213
mozilla firefox
thunderbird
seamonkey
importscripts
same origin policy

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

AI Score

8.7

Confidence

High

EPSS

0.002

Percentile

58.7%

The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.

Affected configurations

Nvd
Node
mozillafirefoxMatch3.5.1
OR
mozillafirefoxMatch3.5.2
OR
mozillafirefoxMatch3.5.3
OR
mozillafirefoxMatch3.5.4
OR
mozillafirefoxMatch3.5.5
OR
mozillafirefoxMatch3.5.6
OR
mozillafirefoxMatch3.5.7
OR
mozillafirefoxMatch3.5.9
OR
mozillafirefoxMatch3.5.10
OR
mozillafirefoxMatch3.6
OR
mozillafirefoxMatch3.6.1
OR
mozillafirefoxMatch3.6.2
OR
mozillafirefoxMatch3.6.3
OR
mozillafirefoxMatch3.6.4
OR
mozillafirefoxMatch3.6.6
Node
mozillathunderbirdMatch3.0
OR
mozillathunderbirdMatch3.0.1
OR
mozillathunderbirdMatch3.0.2
OR
mozillathunderbirdMatch3.0.3
OR
mozillathunderbirdMatch3.0.4
OR
mozillathunderbirdMatch3.0.5
OR
mozillathunderbirdMatch3.1
Node
mozillaseamonkeyRange≤2.0.5
OR
mozillaseamonkeyMatch1.0
OR
mozillaseamonkeyMatch1.0alpha
OR
mozillaseamonkeyMatch1.0beta
OR
mozillaseamonkeyMatch1.0.1
OR
mozillaseamonkeyMatch1.0.2
OR
mozillaseamonkeyMatch1.0.3
OR
mozillaseamonkeyMatch1.0.4
OR
mozillaseamonkeyMatch1.0.5
OR
mozillaseamonkeyMatch1.0.6
OR
mozillaseamonkeyMatch1.0.7
OR
mozillaseamonkeyMatch1.0.8
OR
mozillaseamonkeyMatch1.0.9
OR
mozillaseamonkeyMatch1.1
OR
mozillaseamonkeyMatch1.1alpha
OR
mozillaseamonkeyMatch1.1beta
OR
mozillaseamonkeyMatch1.1.1
OR
mozillaseamonkeyMatch1.1.2
OR
mozillaseamonkeyMatch1.1.3
OR
mozillaseamonkeyMatch1.1.4
OR
mozillaseamonkeyMatch1.1.5
OR
mozillaseamonkeyMatch1.1.6
OR
mozillaseamonkeyMatch1.1.7
OR
mozillaseamonkeyMatch1.1.8
OR
mozillaseamonkeyMatch1.1.9
OR
mozillaseamonkeyMatch1.1.10
OR
mozillaseamonkeyMatch1.1.11
OR
mozillaseamonkeyMatch1.1.12
OR
mozillaseamonkeyMatch1.1.13
OR
mozillaseamonkeyMatch1.1.14
OR
mozillaseamonkeyMatch1.1.15
OR
mozillaseamonkeyMatch1.1.16
OR
mozillaseamonkeyMatch1.1.17
OR
mozillaseamonkeyMatch1.1.18
OR
mozillaseamonkeyMatch1.1.19
OR
mozillaseamonkeyMatch1.5.0.8
OR
mozillaseamonkeyMatch1.5.0.9
OR
mozillaseamonkeyMatch1.5.0.10
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0a1pre
VendorProductVersionCPE
mozillafirefox3.5.1cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
mozillafirefox3.5.2cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
mozillafirefox3.5.3cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
mozillafirefox3.5.4cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
mozillafirefox3.5.5cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
mozillafirefox3.5.6cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
mozillafirefox3.5.7cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
mozillafirefox3.5.9cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*
mozillafirefox3.5.10cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
mozillafirefox3.6cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
Rows per page:
1-10 of 731

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

AI Score

8.7

Confidence

High

EPSS

0.002

Percentile

58.7%