4.3
CVSSv2

CVE-2010-0162

Published: 22/02/2010 Updated: 19/09/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox 3.0.x prior to 3.0.18 and 3.5.x prior to 3.5.8, and SeaMonkey prior to 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote malicious users to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 3.0.12

mozilla firefox 3.0.13

mozilla firefox 3.0.5

mozilla firefox 3.0.6

mozilla firefox 3.0.7

mozilla firefox 3.5.1

mozilla firefox 3.5.2

mozilla seamonkey 1.0.1

mozilla seamonkey 1.0.2

mozilla seamonkey 1.0

mozilla seamonkey 1.1.14

mozilla seamonkey 1.1.15

mozilla seamonkey 1.1.6

mozilla seamonkey 1.1.7

mozilla seamonkey 2.0

mozilla firefox 3.0.14

mozilla firefox 3.0.15

mozilla firefox 3.0.8

mozilla firefox 3.0.9

mozilla firefox 3.5.3

mozilla firefox 3.5.4

mozilla seamonkey 1.0.3

mozilla seamonkey 1.0.4

mozilla seamonkey 1.1

mozilla seamonkey 1.1.1

mozilla seamonkey 1.1.16

mozilla seamonkey 1.1.17

mozilla seamonkey 1.1.8

mozilla seamonkey 1.1.9

mozilla seamonkey 2.0.1

mozilla seamonkey 2.0.2

mozilla firefox 3.0.10

mozilla firefox 3.0.11

mozilla firefox 3.0.3

mozilla firefox 3.0.4

mozilla firefox 3.0

mozilla firefox 3.5

mozilla firefox 3.5.7

mozilla seamonkey 1.0.7

mozilla seamonkey 1.0.8

mozilla seamonkey 1.0.9

mozilla seamonkey 1.1.12

mozilla seamonkey 1.1.13

mozilla seamonkey 1.1.4

mozilla seamonkey 1.1.5

mozilla firefox 3.0.1

mozilla firefox 3.0.17

mozilla firefox 3.0.2

mozilla firefox 3.5.5

mozilla firefox 3.5.6

mozilla seamonkey 1.0.5

mozilla seamonkey 1.0.6

mozilla seamonkey 1.1.10

mozilla seamonkey 1.1.11

mozilla seamonkey 1.1.2

mozilla seamonkey 1.1.3

Vendor Advisories

Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix several security issues are now availablefor Red Hat Enterprise Linux 4 and 5This update has been rated as having critical security impact by the RedHat Security Response Team ...
Several flaws were discovered in the browser engine of Firefox If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2010-0159) ...
Several flaws were discovered in the browser engine of Firefox If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2010-0159) ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1571 Alin Rad Pop discovered that incorrect memory handling in the HTML parser could lead to the execut ...
Mozilla Foundation Security Advisory 2010-05 XSS hazard using SVG document and binary Content-Type Announced February 17, 2010 Reporter Georgi Guninski Impact Moderate Products Firefox, SeaMonkey Fixed in ...