6.8

CVE-2007-0994

Exploit

A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.

Data is provided by the National Vulnerability Database (NVD)
MozillaFirefox Version >= 1.5 < 1.5.0.10
MozillaFirefox Version >= 2.0 < 2.0.0.2
MozillaSeamonkey Version >= 1.0 < 1.0.8
MozillaSeamonkey Version >= 1.1 < 1.1.1
DebianDebian Linux Version3.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.5% 0.847
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733
Patch
Third Party Advisory
Exploit
Issue Tracking
http://securitytracker.com/id?1017726
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/22826
Third Party Advisory
VDB Entry