Описание
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-1530
- https://bugzilla.mozilla.org/show_bug.cgi?id=895557
- https://security.gentoo.org/glsa/201504-01
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2014-0448.html
- http://rhn.redhat.com/errata/RHSA-2014-0449.html
- http://secunia.com/advisories/59866
- http://www.debian.org/security/2014/dsa-2918
- http://www.debian.org/security/2014/dsa-2924
- http://www.mozilla.org/security/announce/2014/mfsa2014-43.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/67137
- http://www.securitytracker.com/id/1030163
- http://www.securitytracker.com/id/1030164
- http://www.securitytracker.com/id/1030165
- http://www.ubuntu.com/usn/USN-2185-1
- http://www.ubuntu.com/usn/USN-2189-1
Связанные уязвимости
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
The docshell implementation in Mozilla Firefox before 29.0, Firefox ES ...
Уязвимость программного пакета SeaMonkey, позволяющая удаленному злоумышленнику выполнить произвольный код