Total vulnerabilities in the database
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
Software | From | Fixed in |
---|---|---|
fedoraproject / fedora | 18 | 18.x |
fedoraproject / fedora | 20 | 20.x |
fedoraproject / fedora | 19 | 19.x |
mozilla / firefox_esr | 24.0 | 24.2 |
mozilla / firefox | - | 26.0 |
mozilla / thunderbird | - | 24.2 |
mozilla / seamonkey | - | 2.23 |
suse / linux_enterprise_desktop | 11-sp3 | 11-sp3.x |
suse / linux_enterprise_server | 11-sp3 | 11-sp3.x |
opensuse / opensuse | 12.3 | 12.3.x |
suse / suse_linux_enterprise_software_development_kit | 11.0-sp3 | 11.0-sp3.x |
opensuse / opensuse | 12.2 | 12.2.x |
opensuse / opensuse | 13.1 | 13.1.x |
canonical / ubuntu_linux | 13.04 | 13.04.x |
canonical / ubuntu_linux | 13.10 | 13.10.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
canonical / ubuntu_linux | 12.10 | 12.10.x |