The Cascading Style Sheets (CSS) implementation in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document, a related issue to CVE-2010-2264.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
20 Nov 2024, 23:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak/ - | |
References | () http://bugzilla.mozilla.org/show_bug.cgi?id=147777 - | |
References | () http://w2spconf.com/2010/papers/p26.pdf - Exploit | |
References | () https://developer.mozilla.org/en/CSS/Privacy_and_the_:visited_selector - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/71816 - |
Information
Published : 2011-12-07 19:55
Updated : 2024-11-20 23:43
NVD link : CVE-2002-2436
Mitre link : CVE-2002-2436
CVE.ORG link : CVE-2002-2436
JSON object : View
Products Affected
mozilla
- seamonkey
- firefox
- thunderbird
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor