ghsa-8j8g-w6r8-wr7h
Vulnerability from github
Published
2022-05-03 03:18
Modified
2022-05-03 03:18
Details
The child frames in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 inherit the default charset from the parent window, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.
{ "affected": [], "aliases": [ "CVE-2007-0996" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-02-27T02:28:00Z", "severity": "MODERATE" }, "details": "The child frames in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 inherit the default charset from the parent window, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.", "id": "GHSA-8j8g-w6r8-wr7h", "modified": "2022-05-03T03:18:03Z", "published": "2022-05-03T03:18:03Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0996" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1103" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10086" }, { "type": "WEB", "url": "http://fedoranews.org/cms/node/2713" }, { "type": "WEB", "url": "http://fedoranews.org/cms/node/2728" }, { "type": "WEB", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742" }, { "type": "WEB", "url": "http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html" }, { "type": "WEB", "url": "http://osvdb.org/33812" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2007-0077.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/24205" }, { "type": "WEB", "url": "http://secunia.com/advisories/24287" }, { "type": "WEB", "url": "http://secunia.com/advisories/24290" }, { "type": "WEB", "url": "http://secunia.com/advisories/24320" }, { "type": "WEB", "url": "http://secunia.com/advisories/24328" }, { "type": "WEB", "url": "http://secunia.com/advisories/24333" }, { "type": "WEB", "url": "http://secunia.com/advisories/24342" }, { "type": "WEB", "url": "http://secunia.com/advisories/24343" }, { "type": "WEB", "url": "http://secunia.com/advisories/24384" }, { "type": "WEB", "url": "http://secunia.com/advisories/24395" }, { "type": "WEB", "url": "http://secunia.com/advisories/24455" }, { "type": "WEB", "url": "http://secunia.com/advisories/24457" }, { "type": "WEB", "url": "http://secunia.com/advisories/24650" }, { "type": "WEB", "url": "http://secunia.com/advisories/25588" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.338131" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.374851" }, { "type": "WEB", "url": "http://www.debian.org/security/2007/dsa-1336" }, { "type": "WEB", "url": "http://www.hardened-php.net/advisory_032007.142.html" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:050" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-02.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_22_mozilla.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0078.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0079.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0097.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0108.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/461076/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/461336/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/22694" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1017702" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-428-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0718" } ], "schema_version": "1.4.0", "severity": [] }
Loading...