Mozilla Firefox 1.5.0.6 allows remote attackers to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker's control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running.
References
Configurations
History
21 Nov 2024, 00:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/31834 - | |
References | () http://polyboy.net/xss/dnsslurp.html - Exploit, URL Repurposed | |
References | () http://shampoo.antville.org/stories/1451301/ - | |
References | () http://www.securityfocus.com/archive/1/443209/100/200/threaded - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://polyboy.net/xss/dnsslurp.html - Exploit, URL Repurposed |
Information
Published : 2006-09-06 00:04
Updated : 2024-11-21 00:16
NVD link : CVE-2006-4561
Mitre link : CVE-2006-4561
CVE.ORG link : CVE-2006-4561
JSON object : View
Products Affected
mozilla
- firefox
CWE