mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 19:17:37 +02:00
19 lines
919 B
Markdown
19 lines
919 B
Markdown
### [CVE-2016-5284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/wisespace-io/cve-search
|
|
|