Executive Summary

Informations
Name CVE-2010-3765 First vendor Publication 2010-10-27
Vendor Cve Last vendor Modification 2017-09-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12108
 
Oval ID: oval:org.mitre.oval:def:12108
Title: Arbitrary code execution vulnerability in Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: windows Class: vulnerability
Reference(s): CVE-2010-3765
Version: 19
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Mozilla Firefox
Mozilla Seamonkey
Mozilla Thunderbird
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13075
 
Oval ID: oval:org.mitre.oval:def:13075
Title: USN-1011-2 -- thunderbird vulnerability
Description: USN-1011-1 fixed a vulnerability in Firefox. This update provides the corresponding update for Thunderbird. Original advisory details: Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a user were tricked into navigating to a malicious site, an attacker could cause a denial of service or possibly execute arbitrary code as the user invoking the program.
Family: unix Class: patch
Reference(s): USN-1011-2
CVE-2010-3765
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.10
Ubuntu 9.10
Ubuntu 10.04
Product(s): thunderbird
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13200
 
Oval ID: oval:org.mitre.oval:def:13200
Title: USN-1011-1 -- firefox, firefox-3.0, firefox-3.5 vulnerability
Description: Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a user were tricked into navigating to a malicious site, an attacker could cause a denial of service or possibly execute arbitrary code as the user invoking the program.
Family: unix Class: patch
Reference(s): USN-1011-1
CVE-2010-3765
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.10
Ubuntu 9.10
Ubuntu 10.04
Product(s): firefox
firefox-3.0
firefox-3.5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13512
 
Oval ID: oval:org.mitre.oval:def:13512
Title: USN-1011-3 -- xulrunner-1.9.1, xulrunner-1.9.2 vulnerability
Description: USN-1011-1 fixed a vulnerability in Firefox. This update provides the corresponding update for Xulrunner. Original advisory details: Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a user were tricked into navigating to a malicious site, an attacker could cause a denial of service or possibly execute arbitrary code as the user invoking the program.
Family: unix Class: patch
Reference(s): USN-1011-3
CVE-2010-3765
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.10
Ubuntu 9.10
Ubuntu 10.04
Product(s): xulrunner-1.9.1
xulrunner-1.9.2
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22070
 
Oval ID: oval:org.mitre.oval:def:22070
Title: RHSA-2010:0896: thunderbird security update (Moderate)
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: unix Class: patch
Reference(s): RHSA-2010:0896-01
CVE-2010-3175
CVE-2010-3176
CVE-2010-3178
CVE-2010-3179
CVE-2010-3180
CVE-2010-3182
CVE-2010-3183
CVE-2010-3765
Version: 107
Platform(s): Red Hat Enterprise Linux 6
Product(s): thunderbird
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22187
 
Oval ID: oval:org.mitre.oval:def:22187
Title: ELSA-2010:0809: xulrunner security update (Critical)
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: unix Class: patch
Reference(s): ELSA-2010:0809-01
CVE-2010-3765
Version: 6
Platform(s): Oracle Linux 5
Product(s): xulrunner
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22273
 
Oval ID: oval:org.mitre.oval:def:22273
Title: RHSA-2010:0861: firefox security update (Critical)
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: unix Class: patch
Reference(s): RHSA-2010:0861-02
CVE-2010-3175
CVE-2010-3176
CVE-2010-3177
CVE-2010-3178
CVE-2010-3179
CVE-2010-3180
CVE-2010-3182
CVE-2010-3183
CVE-2010-3765
Version: 120
Platform(s): Red Hat Enterprise Linux 6
Product(s): firefox
xulrunner
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22356
 
Oval ID: oval:org.mitre.oval:def:22356
Title: RHSA-2010:0812: thunderbird security update (Moderate)
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: unix Class: patch
Reference(s): RHSA-2010:0812-01
CESA-2010:0812
CVE-2010-3765
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): thunderbird
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22375
 
Oval ID: oval:org.mitre.oval:def:22375
Title: RHSA-2010:0809: xulrunner security update (Critical)
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: unix Class: patch
Reference(s): RHSA-2010:0809-01
CESA-2010:0809
CVE-2010-3765
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): xulrunner
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22847
 
Oval ID: oval:org.mitre.oval:def:22847
Title: ELSA-2010:0812: thunderbird security update (Moderate)
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: unix Class: patch
Reference(s): ELSA-2010:0812-01
CVE-2010-3765
Version: 6
Platform(s): Oracle Linux 5
Product(s): thunderbird
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23391
 
Oval ID: oval:org.mitre.oval:def:23391
Title: ELSA-2010:0861: firefox security update (Critical)
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: unix Class: patch
Reference(s): ELSA-2010:0861-02
CVE-2010-3175
CVE-2010-3176
CVE-2010-3177
CVE-2010-3178
CVE-2010-3179
CVE-2010-3180
CVE-2010-3182
CVE-2010-3183
CVE-2010-3765
Version: 41
Platform(s): Oracle Linux 6
Product(s): firefox
xulrunner
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23599
 
Oval ID: oval:org.mitre.oval:def:23599
Title: ELSA-2010:0896: thunderbird security update (Moderate)
Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
Family: unix Class: patch
Reference(s): ELSA-2010:0896-01
CVE-2010-3175
CVE-2010-3176
CVE-2010-3178
CVE-2010-3179
CVE-2010-3180
CVE-2010-3182
CVE-2010-3183
CVE-2010-3765
Version: 37
Platform(s): Oracle Linux 6
Product(s): thunderbird
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28076
 
Oval ID: oval:org.mitre.oval:def:28076
Title: DEPRECATED: ELSA-2010-0809 -- xulrunner security update (critical)
Description: [1.9.2.11-4.0.1.el5_5] - Added xulrunner-oracle-default-prefs.js and removed the corresponding RedHat one. [1.9.2.11-4.el5_5] - Add upstream patch for CVE-2010-3765
Family: unix Class: patch
Reference(s): ELSA-2010-0809
CVE-2010-3765
Version: 4
Platform(s): Oracle Linux 5
Product(s): xulrunner
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 25
Application 17
Application 14

SAINT Exploits

Description Link
Mozilla Firefox document.write and DOM insertion memory corruption More info here

ExploitDB Exploits

id Description
2010-10-28 Firefox Memory Corruption Proof of Concept (Simplified)

OpenVAS Exploits

Date Description
2010-12-02 Name : Fedora Update for firefox FEDORA-2010-16897
File : nvt/gb_fedora_2010_16897_firefox_fc14.nasl
2010-12-02 Name : Fedora Update for galeon FEDORA-2010-16897
File : nvt/gb_fedora_2010_16897_galeon_fc14.nasl
2010-12-02 Name : Fedora Update for xulrunner FEDORA-2010-16897
File : nvt/gb_fedora_2010_16897_xulrunner_fc14.nasl
2010-12-02 Name : Fedora Update for perl-Gtk2-MozEmbed FEDORA-2010-16897
File : nvt/gb_fedora_2010_16897_perl-Gtk2-MozEmbed_fc14.nasl
2010-12-02 Name : Fedora Update for mozvoikko FEDORA-2010-16897
File : nvt/gb_fedora_2010_16897_mozvoikko_fc14.nasl
2010-12-02 Name : Fedora Update for gnome-web-photo FEDORA-2010-16897
File : nvt/gb_fedora_2010_16897_gnome-web-photo_fc14.nasl
2010-12-02 Name : Fedora Update for gnome-python2-extras FEDORA-2010-16897
File : nvt/gb_fedora_2010_16897_gnome-python2-extras_fc14.nasl
2010-11-17 Name : FreeBSD Ports: firefox
File : nvt/freebsd_firefox51.nasl
2010-11-17 Name : Debian Security Advisory DSA 2124-1 (xulrunner)
File : nvt/deb_2124_1.nasl
2010-11-16 Name : Mandriva Update for mozilla-thunderbird MDVSA-2010:219 (mozilla-thunderbird)
File : nvt/gb_mandriva_MDVSA_2010_219.nasl
2010-11-16 Name : SuSE Update for MozillaFirefox,seamonkey,MozillaThunderbird SUSE-SA:2010:056
File : nvt/gb_suse_2010_056.nasl
2010-11-16 Name : Fedora Update for xulrunner FEDORA-2010-16885
File : nvt/gb_fedora_2010_16885_xulrunner_fc12.nasl
2010-11-16 Name : Fedora Update for perl-Gtk2-MozEmbed FEDORA-2010-16885
File : nvt/gb_fedora_2010_16885_perl-Gtk2-MozEmbed_fc12.nasl
2010-11-16 Name : Fedora Update for mozvoikko FEDORA-2010-16885
File : nvt/gb_fedora_2010_16885_mozvoikko_fc12.nasl
2010-11-16 Name : Fedora Update for gnome-web-photo FEDORA-2010-16885
File : nvt/gb_fedora_2010_16885_gnome-web-photo_fc12.nasl
2010-11-16 Name : Fedora Update for gnome-python2-extras FEDORA-2010-16885
File : nvt/gb_fedora_2010_16885_gnome-python2-extras_fc12.nasl
2010-11-16 Name : Fedora Update for galeon FEDORA-2010-16885
File : nvt/gb_fedora_2010_16885_galeon_fc12.nasl
2010-11-16 Name : CentOS Update for thunderbird CESA-2010:0812 centos4 i386
File : nvt/gb_CESA-2010_0812_thunderbird_centos4_i386.nasl
2010-11-16 Name : Fedora Update for firefox FEDORA-2010-16885
File : nvt/gb_fedora_2010_16885_firefox_fc12.nasl
2010-11-04 Name : RedHat Update for xulrunner RHSA-2010:0809-01
File : nvt/gb_RHSA-2010_0809-01_xulrunner.nasl
2010-11-04 Name : Ubuntu Update for Xulrunner vulnerability USN-1011-3
File : nvt/gb_ubuntu_USN_1011_3.nasl
2010-11-04 Name : Ubuntu Update for thunderbird vulnerability USN-1011-2
File : nvt/gb_ubuntu_USN_1011_2.nasl
2010-11-04 Name : Ubuntu Update for Firefox vulnerability USN-1011-1
File : nvt/gb_ubuntu_USN_1011_1.nasl
2010-11-04 Name : CentOS Update for firefox CESA-2010:0808 centos4 i386
File : nvt/gb_CESA-2010_0808_firefox_centos4_i386.nasl
2010-11-04 Name : CentOS Update for seamonkey CESA-2010:0810 centos3 i386
File : nvt/gb_CESA-2010_0810_seamonkey_centos3_i386.nasl
2010-11-04 Name : Mandriva Update for xulrunner MDVSA-2010:213 (xulrunner)
File : nvt/gb_mandriva_MDVSA_2010_213.nasl
2010-11-04 Name : CentOS Update for seamonkey CESA-2010:0810 centos4 i386
File : nvt/gb_CESA-2010_0810_seamonkey_centos4_i386.nasl
2010-11-04 Name : RedHat Update for firefox RHSA-2010:0808-01
File : nvt/gb_RHSA-2010_0808-01_firefox.nasl
2010-11-04 Name : RedHat Update for seamonkey RHSA-2010:0810-01
File : nvt/gb_RHSA-2010_0810-01_seamonkey.nasl
2010-11-04 Name : RedHat Update for thunderbird RHSA-2010:0812-01
File : nvt/gb_RHSA-2010_0812-01_thunderbird.nasl
2010-11-04 Name : Fedora Update for firefox FEDORA-2010-16883
File : nvt/gb_fedora_2010_16883_firefox_fc13.nasl
2010-11-04 Name : Fedora Update for galeon FEDORA-2010-16883
File : nvt/gb_fedora_2010_16883_galeon_fc13.nasl
2010-11-04 Name : Fedora Update for gnome-python2-extras FEDORA-2010-16883
File : nvt/gb_fedora_2010_16883_gnome-python2-extras_fc13.nasl
2010-11-04 Name : Fedora Update for gnome-web-photo FEDORA-2010-16883
File : nvt/gb_fedora_2010_16883_gnome-web-photo_fc13.nasl
2010-11-04 Name : Fedora Update for mozvoikko FEDORA-2010-16883
File : nvt/gb_fedora_2010_16883_mozvoikko_fc13.nasl
2010-11-04 Name : Fedora Update for perl-Gtk2-MozEmbed FEDORA-2010-16883
File : nvt/gb_fedora_2010_16883_perl-Gtk2-MozEmbed_fc13.nasl
2010-11-04 Name : Fedora Update for xulrunner FEDORA-2010-16883
File : nvt/gb_fedora_2010_16883_xulrunner_fc13.nasl
2010-11-02 Name : Mozilla Firefox Unspecified Vulnerability Oct-10 (Windows)
File : nvt/gb_firefox_unspecified_vuln_oct10_win.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
68921 Mozilla Thunderbird DOM Insertion document.write() Unspecified Overflow

Thunderbird is prone to an overflow condition. The application fails to properly sanitize input caused by interactions between DOM insertions and the document.write() function resulting in a heap overflow. With a specially crafted website, a context-dependent attacker can potentially cause arbitrary code execution.
68905 Mozilla Firefox DOM Insertion document.write() Unspecified Overflow

Firefox is prone to an overflow condition. The application fails to properly sanitize input caused by interactions between DOM insertions and the document.write() function resulting in a heap overflow. With a specially crafted website, a context-dependent attacker can potentially cause arbitrary code execution.

Snort® IPS/IDS

Date Description
2014-01-10 Mozilla Firefox appendChild use-after-free attempt
RuleID : 21363 - Revision : 7 - Type : BROWSER-FIREFOX
2014-01-10 Mozilla Firefox appendChild use-after-free attempt
RuleID : 19292 - Revision : 7 - Type : BROWSER-FIREFOX
2014-01-10 Mozilla Firefox html tag attributes memory corruption
RuleID : 19078 - Revision : 11 - Type : BROWSER-FIREFOX
2014-01-10 Mozilla Firefox appendChild use-after-free attempt
RuleID : 19077 - Revision : 9 - Type : BROWSER-FIREFOX
2014-01-10 Mozilla Firefox appendChild use-after-free attempt
RuleID : 19076 - Revision : 9 - Type : BROWSER-FIREFOX
2014-01-10 Mozilla Firefox html tag attributes memory corruption
RuleID : 17804 - Revision : 12 - Type : BROWSER-FIREFOX

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_seamonkey-101028.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_mozilla-xulrunner191-101028.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_MozillaThunderbird-101028.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_MozillaFirefox-101029.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2010-0808.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0809.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0810.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2010-0812.nasl - Type : ACT_GATHER_INFO
2013-01-08 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20101110_firefox_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20101027_xulrunner_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20101027_seamonkey_on_SL3_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20101027_firefox_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20101117_thunderbird_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2010-12-02 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_MozillaFirefox-101103.nasl - Type : ACT_GATHER_INFO
2010-12-02 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_mozilla-xulrunner191-101118.nasl - Type : ACT_GATHER_INFO
2010-11-24 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2010-0808.nasl - Type : ACT_GATHER_INFO
2010-11-24 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0809.nasl - Type : ACT_GATHER_INFO
2010-11-24 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0810.nasl - Type : ACT_GATHER_INFO
2010-11-24 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2010-0812.nasl - Type : ACT_GATHER_INFO
2010-11-18 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0861.nasl - Type : ACT_GATHER_INFO
2010-11-18 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0896.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_MozillaFirefox-101028.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_MozillaThunderbird-101028.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote Fedora host is missing a security update.
File : fedora_2010-17105.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_mozilla-xulrunner191-101028.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_seamonkey-101028.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_MozillaFirefox-101028.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_MozillaThunderbird-101028.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_mozilla-xulrunner191-101028.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_seamonkey-101028.nasl - Type : ACT_GATHER_INFO
2010-11-03 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2124.nasl - Type : ACT_GATHER_INFO
2010-11-02 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-219.nasl - Type : ACT_GATHER_INFO
2010-11-01 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2010-305-01.nasl - Type : ACT_GATHER_INFO
2010-11-01 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2010-16885.nasl - Type : ACT_GATHER_INFO
2010-10-29 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2010-16897.nasl - Type : ACT_GATHER_INFO
2010-10-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1011-3.nasl - Type : ACT_GATHER_INFO
2010-10-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1011-2.nasl - Type : ACT_GATHER_INFO
2010-10-29 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2010-16883.nasl - Type : ACT_GATHER_INFO
2010-10-29 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2010-0812.nasl - Type : ACT_GATHER_INFO
2010-10-29 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-213.nasl - Type : ACT_GATHER_INFO
2010-10-29 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_c223b00de27211df8e32000f20797ede.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0810.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0809.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Windows host contains a web browser affected by a buffer overflow ...
File : seamonkey_2010.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2010-0808.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1011-1.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Windows host contains a web browser affected by a buffer overflow ...
File : mozilla_firefox_3515.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Windows host contains a web browser affected by a buffer overflow ...
File : mozilla_firefox_3612.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Windows host contains a mail client that is affected by a buffer o...
File : mozilla_thunderbird_3010.nasl - Type : ACT_GATHER_INFO
2010-10-28 Name : The remote Windows host contains a mail client that is affected by buffer ove...
File : mozilla_thunderbird_316.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/44425
CONFIRM http://blog.mozilla.com/security/2010/10/26/critical-vulnerability-in-firefox...
http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
http://support.avaya.com/css/P8/documents/100114329
http://support.avaya.com/css/P8/documents/100114335
http://www.mozilla.org/security/announce/2010/mfsa2010-73.html
https://bugzilla.mozilla.org/show_bug.cgi?id=607222
https://bugzilla.redhat.com/show_bug.cgi?id=646997
DEBIAN http://www.debian.org/security/2010/dsa-2124
EXPLOIT-DB http://www.exploit-db.com/exploits/15341
http://www.exploit-db.com/exploits/15342
http://www.exploit-db.com/exploits/15352
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-November/05023...
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050061...
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050077...
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050154...
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2010:213
http://www.mandriva.com/security/advisories?name=MDVSA-2010:219
MISC http://isc.sans.edu/diary.html?storyid=9817
http://norman.com/about_norman/press_center/news_archive/2010/129223/en?utm_s...
http://www.norman.com/about_norman/press_center/news_archive/2010/129223/
http://www.norman.com/security_center/virus_description_archive/129146/
https://bugzilla.mozilla.org/show_bug.cgi?id=607222#c53
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0808.html
http://www.redhat.com/support/errata/RHSA-2010-0809.html
http://www.redhat.com/support/errata/RHSA-2010-0810.html
http://www.redhat.com/support/errata/RHSA-2010-0861.html
http://www.redhat.com/support/errata/RHSA-2010-0896.html
https://rhn.redhat.com/errata/RHSA-2010-0812.html
SECTRACK http://www.securitytracker.com/id?1024645
http://www.securitytracker.com/id?1024650
http://www.securitytracker.com/id?1024651
SECUNIA http://secunia.com/advisories/41761
http://secunia.com/advisories/41965
http://secunia.com/advisories/41966
http://secunia.com/advisories/41969
http://secunia.com/advisories/41975
http://secunia.com/advisories/42003
http://secunia.com/advisories/42008
http://secunia.com/advisories/42043
http://secunia.com/advisories/42867
SLACKWARE http://slackware.com/security/viewer.php?l=slackware-security&y=2010&...
UBUNTU http://www.ubuntu.com/usn/usn-1011-1
http://www.ubuntu.com/usn/USN-1011-2
http://www.ubuntu.com/usn/USN-1011-3
VUPEN http://www.vupen.com/english/advisories/2010/2837
http://www.vupen.com/english/advisories/2010/2857
http://www.vupen.com/english/advisories/2010/2864
http://www.vupen.com/english/advisories/2010/2871
http://www.vupen.com/english/advisories/2011/0061

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2021-05-04 12:12:29
  • Multiple Updates
2021-04-22 01:13:16
  • Multiple Updates
2020-05-23 13:16:56
  • Multiple Updates
2020-05-23 00:26:39
  • Multiple Updates
2017-09-19 09:24:00
  • Multiple Updates
2016-04-26 20:09:16
  • Multiple Updates
2014-06-14 13:29:29
  • Multiple Updates
2014-02-17 10:57:55
  • Multiple Updates
2014-01-19 21:27:12
  • Multiple Updates
2013-05-10 23:34:21
  • Multiple Updates