Loading...
Loading...
Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
June 12, 2009
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2009-1836
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.