CVE-2007-3511

N/A Unknown
Published: July 03, 2007 Modified: April 23, 2026
View on NVD

Description

The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/37994
Source: cve@mitre.org
http://secunia.com/advisories/25904
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27276
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27298
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27325
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27327
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27335
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27336
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27356
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27383
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27387
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27403
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27414
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27425
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27480
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27680
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/3544
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2007/3587
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/0083
Source: cve@mitre.org
Vendor Advisory
https://usn.ubuntu.com/535-1/
Source: cve@mitre.org
http://osvdb.org/37994
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25904
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27276
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27298
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27325
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27327
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27335
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27336
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27356
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27383
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27387
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27403
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27414
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27425
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27480
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27680
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1018837
Source: af854a3a-2127-422b-91ae-364da2661108
http://sla.ckers.org/forum/read.php?3%2C13142
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1392
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1396
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1401
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2007/mfsa2007-32.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0979.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0980.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0981.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/482876/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/482925/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/482932/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/24725
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-536-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3544
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2007/3587
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/0083
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://yathong.googlepages.com/FirefoxFocusBug.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/35299
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-1858
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/535-1/
Source: af854a3a-2127-422b-91ae-364da2661108

96 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.5%
89th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mozilla