Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-0296

Опубликовано: 02 фев. 2006
Источник: debian
EPSS Средний

Описание

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed1.5.dfsg+1.5.0.1-1package
mozillafixed2:1.7.13-0.1package
thunderbirdfixed1.5.0.2-1package

EPSS

Процентиль: 97%
0.41202
Средний

Связанные уязвимости

ubuntu
больше 19 лет назад

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

redhat
больше 19 лет назад

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

nvd
больше 19 лет назад

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

github
больше 3 лет назад

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

EPSS

Процентиль: 97%
0.41202
Средний