CVE-2006-4561

Mozilla Firefox 1.5.0.6 allows remote attackers to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker's control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://osvdb.org/31834 - () http://osvdb.org/31834 -
References () http://polyboy.net/xss/dnsslurp.html - Exploit, URL Repurposed () http://polyboy.net/xss/dnsslurp.html - Exploit, URL Repurposed
References () http://shampoo.antville.org/stories/1451301/ - () http://shampoo.antville.org/stories/1451301/ -
References () http://www.securityfocus.com/archive/1/443209/100/200/threaded - () http://www.securityfocus.com/archive/1/443209/100/200/threaded -

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://polyboy.net/xss/dnsslurp.html - Exploit (MISC) http://polyboy.net/xss/dnsslurp.html - Exploit, URL Repurposed

Information

Published : 2006-09-06 00:04

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4561

Mitre link : CVE-2006-4561

CVE.ORG link : CVE-2006-4561


JSON object : View

Products Affected

mozilla

  • firefox