If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
debian debian linux 9.0 |
||
debian debian linux 7.0 |
||
debian debian linux 8.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux server aus 7.4 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux 6.0 |
||
redhat enterprise linux 7.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server eus 7.5 |
||
redhat enterprise linux server aus 7.3 |
||
redhat enterprise linux server eus 7.3 |
||
redhat enterprise linux server eus 7.4 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux server 7.0 |
||
mozilla firefox |
||
mozilla firefox esr |
||
mozilla thunderbird |
||
canonical ubuntu linux 17.10 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 16.04 |
OG open-source darling gets security check-up
Mozilla's Firefox has been patched to address more than 30 CVE-listed security vulnerabilities. The open-source browser has been updated in both its regular (Firefox 58) and extended support (ESR 52.6) flavors. You should install these as soon as possible. The Firefox 58 update includes fixes for critical memory corruption bugs (under the blanket CVE-2018-5089 and CVE-2018-5090 labels) that could be exploited by dodgy webpages to execute malicious code within the browser – in other words, hija...