Описание
The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | not-affected | |
hardy | ignored | end of life |
intrepid | DNE | |
jaunty | DNE | |
karmic | DNE | |
lucid | not-affected | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | ignored | |
hardy | ignored | |
intrepid | ignored | |
jaunty | ignored | |
karmic | ignored | |
lucid | ignored | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | released | 2.0.0.22+build1+nobinonly-0ubuntu1.nspr474 |
hardy | released | 2.0.0.22+build1+nobinonly-0ubuntu0.8.04.1 |
intrepid | released | 2.0.0.22+build1+nobinonly-0ubuntu0.8.10.1 |
jaunty | released | 2.0.0.22+build1+nobinonly-0ubuntu0.9.04.1 |
karmic | released | 2.0.0.22+build1+nobinonly-0ubuntu1.nspr474 |
lucid | released | 2.0.0.22+build1+nobinonly-0ubuntu1.nspr474 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | ignored | |
intrepid | ignored | |
jaunty | ignored | |
karmic | ignored | |
lucid | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
gutsy | ignored | end of life, was needed |
hardy | released | 1.9.0.9+nobinonly-0ubuntu0.8.04.1 |
intrepid | released | 1.9.0.9+nobinonly-0ubuntu0.8.10.1 |
jaunty | released | 1.9.0.9+nobinonly-0ubuntu0.9.04.1 |
karmic | DNE | |
lucid | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
intrepid | DNE | |
jaunty | released | 1.9.1+nobinonly-0ubuntu0.9.04.1 |
karmic | released | 1.9.1~rc2+nobinonly-0ubuntu1 |
lucid | DNE | |
upstream | needs-triage |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbi ...
The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
EPSS
4.3 Medium
CVSS2