Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c65v-php3-gmxx

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

Ссылки

EPSS

Процентиль: 97%
0.41202
Средний

Связанные уязвимости

ubuntu
больше 19 лет назад

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

redhat
больше 19 лет назад

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

nvd
больше 19 лет назад

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

debian
больше 19 лет назад

The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, a ...

EPSS

Процентиль: 97%
0.41202
Средний