Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-5947

Опубликовано: 08 фев. 2007
Источник: redhat
EPSS Низкий

Описание

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79

EPSS

Процентиль: 92%
0.07915
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.

nvd
больше 17 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.

debian
больше 17 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMon ...

github
больше 3 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.

oracle-oval
больше 17 лет назад

ELSA-2007-1082: Critical: firefox security update (CRITICAL)

EPSS

Процентиль: 92%
0.07915
Низкий