CVE Vulnerabilities

CVE-2010-2751

Published: Jul 30, 2010 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
2.6 LOW
AV:N/AC:H/Au:N/C:N/I:P/A:N
RedHat/V2
2.6 MODERATE
AV:N/AC:H/Au:N/C:N/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla3.5.1 (including)3.5.1 (including)
FirefoxMozilla3.5.2 (including)3.5.2 (including)
FirefoxMozilla3.5.3 (including)3.5.3 (including)
FirefoxMozilla3.5.4 (including)3.5.4 (including)
FirefoxMozilla3.5.5 (including)3.5.5 (including)
FirefoxMozilla3.5.6 (including)3.5.6 (including)
FirefoxMozilla3.5.7 (including)3.5.7 (including)
FirefoxMozilla3.5.9 (including)3.5.9 (including)
FirefoxMozilla3.5.10 (including)3.5.10 (including)
FirefoxMozilla3.6.1 (including)3.6.1 (including)
FirefoxMozilla3.6.2 (including)3.6.2 (including)
FirefoxMozilla3.6.3 (including)3.6.3 (including)
FirefoxMozilla3.6.4 (including)3.6.4 (including)
FirefoxMozilla3.6.6 (including)3.6.6 (including)
Red Hat Enterprise Linux 3RedHatseamonkey-0:1.0.9-0.57.el3*
Red Hat Enterprise Linux 4RedHatseamonkey-0:1.0.9-60.el4*
Red Hat Enterprise Linux 4RedHatfirefox-0:3.6.7-2.el4*
Red Hat Enterprise Linux 5RedHatfirefox-0:3.6.7-2.el5*
Red Hat Enterprise Linux 5RedHatxulrunner-0:1.9.2.7-2.el5*
FirefoxUbuntudapper*
FirefoxUbuntudevel*
FirefoxUbuntuhardy*
FirefoxUbuntulucid*
Firefox-3.0Ubuntuhardy*
Firefox-3.0Ubuntujaunty*
Firefox-3.5Ubuntujaunty*
Firefox-3.5Ubuntukarmic*
Xulrunner-1.9.2Ubuntudevel*
Xulrunner-1.9.2Ubuntuhardy*
Xulrunner-1.9.2Ubuntujaunty*
Xulrunner-1.9.2Ubuntukarmic*
Xulrunner-1.9.2Ubuntulucid*

References