Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - | |
References | () http://lcamtuf.coredump.cx/ietrap/ff/ - | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052630.html - | |
References | () http://osvdb.org/33809 - | |
References | () http://secunia.com/advisories/27276 - Vendor Advisory | |
References | () http://secunia.com/advisories/27298 - Vendor Advisory | |
References | () http://secunia.com/advisories/27311 - Vendor Advisory | |
References | () http://secunia.com/advisories/27315 - Vendor Advisory | |
References | () http://secunia.com/advisories/27325 - Vendor Advisory | |
References | () http://secunia.com/advisories/27327 - Vendor Advisory | |
References | () http://secunia.com/advisories/27335 - Vendor Advisory | |
References | () http://secunia.com/advisories/27336 - Vendor Advisory | |
References | () http://secunia.com/advisories/27356 - Vendor Advisory | |
References | () http://secunia.com/advisories/27360 - Vendor Advisory | |
References | () http://secunia.com/advisories/27383 - Vendor Advisory | |
References | () http://secunia.com/advisories/27387 - Vendor Advisory | |
References | () http://secunia.com/advisories/27403 - Vendor Advisory | |
References | () http://secunia.com/advisories/27414 - Vendor Advisory | |
References | () http://secunia.com/advisories/27425 - Vendor Advisory | |
References | () http://secunia.com/advisories/27480 - Vendor Advisory | |
References | () http://secunia.com/advisories/27665 - Vendor Advisory | |
References | () http://secunia.com/advisories/27680 - Vendor Advisory | |
References | () http://secunia.com/advisories/28398 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/2310 - | |
References | () http://securitytracker.com/id?1018837 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1 - | |
References | () http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html - | |
References | () http://www.debian.org/security/2007/dsa-1392 - | |
References | () http://www.debian.org/security/2007/dsa-1396 - | |
References | () http://www.debian.org/security/2007/dsa-1401 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml - | |
References | () http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202 - | |
References | () http://www.mozilla.org/security/announce/2007/mfsa2007-30.html - | |
References | () http://www.novell.com/linux/security/advisories/2007_57_mozilla.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0979.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0980.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0981.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/461007/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/461023/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/482876/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/482925/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/482932/100/200/threaded - | |
References | () http://www.securityfocus.com/bid/22688 - | |
References | () http://www.ubuntu.com/usn/usn-536-1 - | |
References | () http://www.vupen.com/english/advisories/2007/3544 - | |
References | () http://www.vupen.com/english/advisories/2007/3587 - | |
References | () http://www.vupen.com/english/advisories/2008/0083 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=371360 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32647 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32649 - | |
References | () https://issues.rpath.com/browse/RPL-1858 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11665 - | |
References | () https://usn.ubuntu.com/535-1/ - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html - |
Information
Published : 2007-02-26 17:28
Updated : 2024-11-21 00:27
NVD link : CVE-2007-1095
Mitre link : CVE-2007-1095
CVE.ORG link : CVE-2007-1095
JSON object : View
Products Affected
mozilla
- firefox
- seamonkey
CWE