4.3
CVE-2011-2605
- EPSS 0.35%
- Published 30.06.2011 16:55:05
- Last modified 11.04.2025 00:51:21
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
Data is provided by the National Vulnerability Database (NVD)
Mozilla ≫ Thunderbird Version <= 3.1.10
Mozilla ≫ Thunderbird Version0.1
Mozilla ≫ Thunderbird Version0.2
Mozilla ≫ Thunderbird Version0.3
Mozilla ≫ Thunderbird Version0.4
Mozilla ≫ Thunderbird Version0.5
Mozilla ≫ Thunderbird Version0.6
Mozilla ≫ Thunderbird Version0.7
Mozilla ≫ Thunderbird Version0.7.1
Mozilla ≫ Thunderbird Version0.7.2
Mozilla ≫ Thunderbird Version0.7.3
Mozilla ≫ Thunderbird Version0.8
Mozilla ≫ Thunderbird Version0.9
Mozilla ≫ Thunderbird Version1.0
Mozilla ≫ Thunderbird Version1.0.1
Mozilla ≫ Thunderbird Version1.0.2
Mozilla ≫ Thunderbird Version1.0.3
Mozilla ≫ Thunderbird Version1.0.4
Mozilla ≫ Thunderbird Version1.0.5
Mozilla ≫ Thunderbird Version1.0.6
Mozilla ≫ Thunderbird Version1.0.7
Mozilla ≫ Thunderbird Version1.0.8
Mozilla ≫ Thunderbird Version1.5
Mozilla ≫ Thunderbird Version1.5 Updatebeta2
Mozilla ≫ Thunderbird Version1.5.0.1
Mozilla ≫ Thunderbird Version1.5.0.2
Mozilla ≫ Thunderbird Version1.5.0.3
Mozilla ≫ Thunderbird Version1.5.0.4
Mozilla ≫ Thunderbird Version1.5.0.5
Mozilla ≫ Thunderbird Version1.5.0.6
Mozilla ≫ Thunderbird Version1.5.0.7
Mozilla ≫ Thunderbird Version1.5.0.8
Mozilla ≫ Thunderbird Version1.5.0.9
Mozilla ≫ Thunderbird Version1.5.0.10
Mozilla ≫ Thunderbird Version1.5.0.11
Mozilla ≫ Thunderbird Version1.5.0.12
Mozilla ≫ Thunderbird Version1.5.0.13
Mozilla ≫ Thunderbird Version1.5.0.14
Mozilla ≫ Thunderbird Version1.5.1
Mozilla ≫ Thunderbird Version1.5.2
Mozilla ≫ Thunderbird Version1.7.1
Mozilla ≫ Thunderbird Version1.7.3
Mozilla ≫ Thunderbird Version2.0
Mozilla ≫ Thunderbird Version2.0.0.0
Mozilla ≫ Thunderbird Version2.0.0.1
Mozilla ≫ Thunderbird Version2.0.0.2
Mozilla ≫ Thunderbird Version2.0.0.3
Mozilla ≫ Thunderbird Version2.0.0.4
Mozilla ≫ Thunderbird Version2.0.0.5
Mozilla ≫ Thunderbird Version2.0.0.6
Mozilla ≫ Thunderbird Version2.0.0.7
Mozilla ≫ Thunderbird Version2.0.0.8
Mozilla ≫ Thunderbird Version2.0.0.9
Mozilla ≫ Thunderbird Version2.0.0.12
Mozilla ≫ Thunderbird Version2.0.0.14
Mozilla ≫ Thunderbird Version2.0.0.16
Mozilla ≫ Thunderbird Version2.0.0.17
Mozilla ≫ Thunderbird Version2.0.0.18
Mozilla ≫ Thunderbird Version2.0.0.19
Mozilla ≫ Thunderbird Version2.0.0.21
Mozilla ≫ Thunderbird Version2.0.0.22
Mozilla ≫ Thunderbird Version2.0.0.23
Mozilla ≫ Thunderbird Version3.0
Mozilla ≫ Thunderbird Version3.0.1
Mozilla ≫ Thunderbird Version3.0.2
Mozilla ≫ Thunderbird Version3.0.3
Mozilla ≫ Thunderbird Version3.0.4
Mozilla ≫ Thunderbird Version3.0.5
Mozilla ≫ Thunderbird Version3.0.6
Mozilla ≫ Thunderbird Version3.0.7
Mozilla ≫ Thunderbird Version3.0.8
Mozilla ≫ Thunderbird Version3.0.9
Mozilla ≫ Thunderbird Version3.0.10
Mozilla ≫ Thunderbird Version3.0.11
Mozilla ≫ Thunderbird Version3.1
Mozilla ≫ Thunderbird Version3.1.1
Mozilla ≫ Thunderbird Version3.1.2
Mozilla ≫ Thunderbird Version3.1.3
Mozilla ≫ Thunderbird Version3.1.4
Mozilla ≫ Thunderbird Version3.1.5
Mozilla ≫ Thunderbird Version3.1.6
Mozilla ≫ Thunderbird Version3.1.7
Mozilla ≫ Thunderbird Version3.1.8
Mozilla ≫ Thunderbird Version3.1.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.35% | 0.541 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.