Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-3014

Опубликовано: 31 авг. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location HTTP response header or (2) specifying the content of a Location HTTP response header.

РелизСтатусПримечание
dapper

ignored

end of life
devel

ignored

hardy

ignored

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

ignored

hardy

ignored

intrepid

ignored

jaunty

ignored

karmic

ignored

upstream

ignored

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

ignored

intrepid

ignored

jaunty

ignored

karmic

DNE

upstream

ignored

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

ignored

hardy

DNE

intrepid

DNE

jaunty

ignored

karmic

ignored

upstream

ignored

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

ignored

hardy

ignored

intrepid

DNE

jaunty

ignored

end of life, was needs-triage
karmic

ignored

end of life, was needs-triage
upstream

ignored

Показывать по

Ссылки на источники

EPSS

Процентиль: 52%
0.00286
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location HTTP response header or (2) specifying the content of a Location HTTP response header.

nvd
почти 16 лет назад

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location HTTP response header or (2) specifying the content of a Location HTTP response header.

debian
почти 16 лет назад

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; S ...

github
больше 3 лет назад

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location HTTP response header or (2) specifying the content of a Location HTTP response header.

EPSS

Процентиль: 52%
0.00286
Низкий

4.3 Medium

CVSS2