Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-1306

Опубликовано: 22 апр. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

hardy

ignored

end of life
intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

ignored

hardy

ignored

intrepid

ignored

jaunty

ignored

karmic

ignored

lucid

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

2.0.0.22+build1+nobinonly-0ubuntu1.nspr474
hardy

released

2.0.0.22+build1+nobinonly-0ubuntu0.8.04.1
intrepid

released

2.0.0.22+build1+nobinonly-0ubuntu0.8.10.1
jaunty

released

2.0.0.22+build1+nobinonly-0ubuntu0.9.04.1
karmic

released

2.0.0.22+build1+nobinonly-0ubuntu1.nspr474
lucid

released

2.0.0.22+build1+nobinonly-0ubuntu1.nspr474
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

ignored

intrepid

ignored

jaunty

ignored

karmic

ignored

lucid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

gutsy

ignored

end of life, was needed
hardy

released

1.9.0.9+nobinonly-0ubuntu0.8.04.1
intrepid

released

1.9.0.9+nobinonly-0ubuntu0.8.10.1
jaunty

released

1.9.0.9+nobinonly-0ubuntu0.9.04.1
karmic

DNE

lucid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

intrepid

DNE

jaunty

released

1.9.1+nobinonly-0ubuntu0.9.04.1
karmic

released

1.9.1~rc2+nobinonly-0ubuntu1
lucid

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 79%
0.01363
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.

nvd
около 16 лет назад

The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.

debian
около 16 лет назад

The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbi ...

github
около 3 лет назад

The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.

oracle-oval
около 16 лет назад

ELSA-2009-0436: firefox security update (CRITICAL)

EPSS

Процентиль: 79%
0.01363
Низкий

4.3 Medium

CVSS2

Уязвимость CVE-2009-1306