A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.
References
Configurations
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc - Broken Link | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc - Broken Link | |
References | () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - Broken Link | |
References | () http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html - Broken Link | |
References | () http://secunia.com/advisories/24384 - Third Party Advisory | |
References | () http://secunia.com/advisories/24395 - Third Party Advisory | |
References | () http://secunia.com/advisories/24455 - Third Party Advisory | |
References | () http://secunia.com/advisories/24457 - Third Party Advisory | |
References | () http://secunia.com/advisories/24650 - Third Party Advisory | |
References | () http://secunia.com/advisories/25588 - Third Party Advisory | |
References | () http://securitytracker.com/id?1017726 - Third Party Advisory, VDB Entry | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 - Mailing List, Third Party Advisory | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2007/dsa-1336 - Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2007/mfsa2007-09.html - Vendor Advisory | |
References | () http://www.novell.com/linux/security/advisories/2007_22_mozilla.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0078.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0097.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/22826 - Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2007/0823 - Third Party Advisory | |
References | () https://issues.rpath.com/browse/RPL-1103 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 - Third Party Advisory |
Information
Published : 2007-03-06 00:19
Updated : 2024-11-21 00:27
NVD link : CVE-2007-0994
Mitre link : CVE-2007-0994
CVE.ORG link : CVE-2007-0994
JSON object : View
Products Affected
debian
- debian_linux
mozilla
- firefox
- seamonkey
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')