5
CVE-2011-3670
- EPSS 0.73%
- Published 01.02.2012 16:55:00
- Last modified 11.04.2025 00:51:21
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.
Data is provided by the National Vulnerability Database (NVD)
Mozilla ≫ Thunderbird Version <= 3.1.7
Mozilla ≫ Thunderbird Version0.1
Mozilla ≫ Thunderbird Version0.2
Mozilla ≫ Thunderbird Version0.3
Mozilla ≫ Thunderbird Version0.4
Mozilla ≫ Thunderbird Version0.5
Mozilla ≫ Thunderbird Version0.6
Mozilla ≫ Thunderbird Version0.7
Mozilla ≫ Thunderbird Version0.7.1
Mozilla ≫ Thunderbird Version0.7.2
Mozilla ≫ Thunderbird Version0.7.3
Mozilla ≫ Thunderbird Version0.8
Mozilla ≫ Thunderbird Version0.9
Mozilla ≫ Thunderbird Version1.0
Mozilla ≫ Thunderbird Version1.0.1
Mozilla ≫ Thunderbird Version1.0.2
Mozilla ≫ Thunderbird Version1.0.3
Mozilla ≫ Thunderbird Version1.0.4
Mozilla ≫ Thunderbird Version1.0.5
Mozilla ≫ Thunderbird Version1.0.5 Updatebeta
Mozilla ≫ Thunderbird Version1.0.6
Mozilla ≫ Thunderbird Version1.0.7
Mozilla ≫ Thunderbird Version1.0.8
Mozilla ≫ Thunderbird Version1.5
Mozilla ≫ Thunderbird Version1.5 Updatebeta2
Mozilla ≫ Thunderbird Version1.5.0.1
Mozilla ≫ Thunderbird Version1.5.0.2
Mozilla ≫ Thunderbird Version1.5.0.3
Mozilla ≫ Thunderbird Version1.5.0.4
Mozilla ≫ Thunderbird Version1.5.0.5
Mozilla ≫ Thunderbird Version1.5.0.6
Mozilla ≫ Thunderbird Version1.5.0.7
Mozilla ≫ Thunderbird Version1.5.0.8
Mozilla ≫ Thunderbird Version1.5.0.9
Mozilla ≫ Thunderbird Version1.5.0.10
Mozilla ≫ Thunderbird Version1.5.0.11
Mozilla ≫ Thunderbird Version1.5.0.12
Mozilla ≫ Thunderbird Version1.5.0.13
Mozilla ≫ Thunderbird Version1.5.0.14
Mozilla ≫ Thunderbird Version1.5.1
Mozilla ≫ Thunderbird Version1.5.2
Mozilla ≫ Thunderbird Version1.7.1
Mozilla ≫ Thunderbird Version1.7.3
Mozilla ≫ Thunderbird Version2.0
Mozilla ≫ Thunderbird Version2.0.0.0
Mozilla ≫ Thunderbird Version2.0.0.1
Mozilla ≫ Thunderbird Version2.0.0.2
Mozilla ≫ Thunderbird Version2.0.0.3
Mozilla ≫ Thunderbird Version2.0.0.4
Mozilla ≫ Thunderbird Version2.0.0.5
Mozilla ≫ Thunderbird Version2.0.0.6
Mozilla ≫ Thunderbird Version2.0.0.7
Mozilla ≫ Thunderbird Version2.0.0.8
Mozilla ≫ Thunderbird Version2.0.0.9
Mozilla ≫ Thunderbird Version2.0.0.11
Mozilla ≫ Thunderbird Version2.0.0.12
Mozilla ≫ Thunderbird Version2.0.0.13
Mozilla ≫ Thunderbird Version2.0.0.14
Mozilla ≫ Thunderbird Version2.0.0.15
Mozilla ≫ Thunderbird Version2.0.0.16
Mozilla ≫ Thunderbird Version2.0.0.17
Mozilla ≫ Thunderbird Version2.0.0.18
Mozilla ≫ Thunderbird Version2.0.0.19
Mozilla ≫ Thunderbird Version2.0.0.20
Mozilla ≫ Thunderbird Version2.0.0.21
Mozilla ≫ Thunderbird Version2.0.0.22
Mozilla ≫ Thunderbird Version2.0.0.23
Mozilla ≫ Thunderbird Version3.0
Mozilla ≫ Thunderbird Version3.0.1
Mozilla ≫ Thunderbird Version3.0.2
Mozilla ≫ Thunderbird Version3.0.3
Mozilla ≫ Thunderbird Version3.0.4
Mozilla ≫ Thunderbird Version3.0.5
Mozilla ≫ Thunderbird Version3.0.6
Mozilla ≫ Thunderbird Version3.0.7
Mozilla ≫ Thunderbird Version3.0.8
Mozilla ≫ Thunderbird Version3.0.9
Mozilla ≫ Thunderbird Version3.0.10
Mozilla ≫ Thunderbird Version3.0.11
Mozilla ≫ Thunderbird Version3.1
Mozilla ≫ Thunderbird Version3.1.1
Mozilla ≫ Thunderbird Version3.1.2
Mozilla ≫ Thunderbird Version3.1.3
Mozilla ≫ Thunderbird Version3.1.4
Mozilla ≫ Thunderbird Version3.1.5
Mozilla ≫ Thunderbird Version3.1.6
Mozilla ≫ Thunderbird Version3.1.10
Mozilla ≫ Thunderbird Version3.1.11
Mozilla ≫ Thunderbird Version5.0
Mozilla ≫ Thunderbird Version6.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.73% | 0.702 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.