The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
Publish Date : 2010-03-26 Last Update Date : 2018-10-10
Title |
Definition Id |
Class |
Family |
CVE-2010-1125 |
oval:org.opensuse.security:def:20101125 |
|
unix |
DEPRECATED: ELSA-2010-0501 -- firefox security, bug fix, and enhancement update (critical) |
oval:org.mitre.oval:def:27902 |
|
unix |
ELSA-2010:0501: firefox security, bug fix, and enhancement update (Critical) |
oval:org.mitre.oval:def:22794 |
|
unix |
RHSA-2010:0500: firefox security, bug fix, and enhancement update (Critical) |
oval:com.redhat.rhsa:def:20100500 |
|
unix |
RHSA-2010:0501: firefox security, bug fix, and enhancement update (Critical) |
oval:org.mitre.oval:def:21689 |
|
unix |
RHSA-2010:0501: firefox security, bug fix, and enhancement update (Critical) |
oval:com.redhat.rhsa:def:20100501 |
|
unix |
The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, a... |
oval:org.mitre.oval:def:13962 |
|
windows |
The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, a... |
oval:org.mitre.oval:def:10386 |
|
unix |
|
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify
a vulnerability or a missing patch. Check out the OVAL definitions
if you want to learn what you should do to verify a vulnerability.