Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-2783

Опубликовано: 02 июн. 2006
Источник: debian
EPSS Низкий

Описание

Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed1.5.dfsg+1.5.0.4-1package
thunderbirdfixed1.5.0.4-1package
mozillafixed2:1.7.13-0.3package
xulrunnerfixed1.8.0.4-1package
webkitfixed1.0.1-1package
qt4-x11fixed4:4.6.2-4package
qt4-x11no-dsalennypackage
kdelibsnot-affectedpackage

Примечания

  • MFSA-2006-42

  • http://trac.webkit.org/changeset/33380

  • QT4 might be fixed earlier, but only 4.6.2 was checked against, Lenny is affected

EPSS

Процентиль: 89%
0.04975
Низкий

Связанные уязвимости

ubuntu
около 19 лет назад

Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.

redhat
около 19 лет назад

Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.

nvd
около 19 лет назад

Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.

github
больше 3 лет назад

Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.

EPSS

Процентиль: 89%
0.04975
Низкий