Firefox Sage extension 1.3.8 and earlier allows remote attackers to execute arbitrary Javascript in the local context via an RSS feed with an img tag containing the script followed by an extra trailing ">", which Sage modifies to close the img element before the malicious script.
References
Configurations
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://michaeldaw.org/md-hacks/rss-injection-in-sage-part-2/ - Exploit | |
References | () http://secunia.com/advisories/22809 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/452010/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/4426 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30179 - |
Information
Published : 2007-01-11 23:28
Updated : 2024-11-21 00:23
NVD link : CVE-2006-6919
Mitre link : CVE-2006-6919
CVE.ORG link : CVE-2006-6919
JSON object : View
Products Affected
sage-mozdev
- sage
CWE