Mozilla Firefox prior to 19.0, Firefox ESR 17.x prior to 17.0.3, Thunderbird prior to 17.0.3, Thunderbird ESR 17.x prior to 17.0.3, and SeaMonkey prior to 2.16 allow man-in-the-middle malicious users to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox |
||
mozilla firefox esr |
||
mozilla seamonkey |
||
mozilla thunderbird |
||
mozilla thunderbird esr |
||
opensuse opensuse 11.4 |
||
opensuse opensuse 12.1 |
||
opensuse opensuse 12.2 |
||
redhat enterprise linux aus 5.9 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux eus 5.9 |
||
redhat enterprise linux eus 6.3 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux workstation 6.0 |
||
debian debian linux 7.0 |
||
canonical ubuntu linux 10.04 |
||
canonical ubuntu linux 11.10 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 12.10 |