Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.800880
Category:General
Title:Flock Address Bar Spoofing Vulnerability (Linux)
Summary:This host is installed with Flock Browser and is prone to Address;Bar Spoofing vulnerability.
Description:Summary:
This host is installed with Flock Browser and is prone to Address
Bar Spoofing vulnerability.

Vulnerability Insight:
Error exists when opening a new window using 'window.open()',
which can be exploited to display spoofed content in the browser window while
the address bar shows an arbitrary path on a possibly trusted host.

Vulnerability Impact:
Successful exploitation lets the attackers to spoof parts of the
address bar and modify page content on a host that a user may consider partly
trusted.

Affected Software/OS:
Flock version 2.5.1 on Linux.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3007
http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html
XForce ISS Database: multiple-windowopen-spoofing(53010)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53010
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.