Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h9pq-wmwj-wp3f

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events.

Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events.

EPSS

Процентиль: 82%
0.01816
Низкий

Связанные уязвимости

redhat
больше 21 года назад

Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events.

nvd
больше 21 года назад

Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events.

debian
больше 21 года назад

Mozilla before 1.4.2 executes Javascript events in the context of a ne ...

EPSS

Процентиль: 82%
0.01816
Низкий