9.3
CVE-2010-1585
- EPSS 0.88%
- Published 28.04.2010 22:30:00
- Last modified 11.04.2025 00:51:21
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.
Data is provided by the National Vulnerability Database (NVD)
Mozilla ≫ Thunderbird Version <= 3.1.7
Mozilla ≫ Thunderbird Version0.1
Mozilla ≫ Thunderbird Version0.2
Mozilla ≫ Thunderbird Version0.3
Mozilla ≫ Thunderbird Version0.4
Mozilla ≫ Thunderbird Version0.5
Mozilla ≫ Thunderbird Version0.6
Mozilla ≫ Thunderbird Version0.7
Mozilla ≫ Thunderbird Version0.7.1
Mozilla ≫ Thunderbird Version0.7.2
Mozilla ≫ Thunderbird Version0.7.3
Mozilla ≫ Thunderbird Version0.8
Mozilla ≫ Thunderbird Version0.9
Mozilla ≫ Thunderbird Version1.0
Mozilla ≫ Thunderbird Version1.0.1
Mozilla ≫ Thunderbird Version1.0.2
Mozilla ≫ Thunderbird Version1.0.3
Mozilla ≫ Thunderbird Version1.0.4
Mozilla ≫ Thunderbird Version1.0.5
Mozilla ≫ Thunderbird Version1.0.6
Mozilla ≫ Thunderbird Version1.0.7
Mozilla ≫ Thunderbird Version1.0.8
Mozilla ≫ Thunderbird Version1.5
Mozilla ≫ Thunderbird Version1.5 Updatebeta2
Mozilla ≫ Thunderbird Version1.5.0.1
Mozilla ≫ Thunderbird Version1.5.0.2
Mozilla ≫ Thunderbird Version1.5.0.3
Mozilla ≫ Thunderbird Version1.5.0.4
Mozilla ≫ Thunderbird Version1.5.0.5
Mozilla ≫ Thunderbird Version1.5.0.6
Mozilla ≫ Thunderbird Version1.5.0.7
Mozilla ≫ Thunderbird Version1.5.0.8
Mozilla ≫ Thunderbird Version1.5.0.9
Mozilla ≫ Thunderbird Version1.5.0.10
Mozilla ≫ Thunderbird Version1.5.0.11
Mozilla ≫ Thunderbird Version1.5.0.12
Mozilla ≫ Thunderbird Version1.5.0.13
Mozilla ≫ Thunderbird Version1.5.0.14
Mozilla ≫ Thunderbird Version1.5.1
Mozilla ≫ Thunderbird Version1.5.2
Mozilla ≫ Thunderbird Version1.7.1
Mozilla ≫ Thunderbird Version1.7.3
Mozilla ≫ Thunderbird Version2.0
Mozilla ≫ Thunderbird Version2.0.0.0
Mozilla ≫ Thunderbird Version2.0.0.1
Mozilla ≫ Thunderbird Version2.0.0.2
Mozilla ≫ Thunderbird Version2.0.0.3
Mozilla ≫ Thunderbird Version2.0.0.4
Mozilla ≫ Thunderbird Version2.0.0.5
Mozilla ≫ Thunderbird Version2.0.0.6
Mozilla ≫ Thunderbird Version2.0.0.7
Mozilla ≫ Thunderbird Version2.0.0.8
Mozilla ≫ Thunderbird Version2.0.0.9
Mozilla ≫ Thunderbird Version2.0.0.12
Mozilla ≫ Thunderbird Version2.0.0.14
Mozilla ≫ Thunderbird Version2.0.0.16
Mozilla ≫ Thunderbird Version2.0.0.17
Mozilla ≫ Thunderbird Version2.0.0.18
Mozilla ≫ Thunderbird Version2.0.0.19
Mozilla ≫ Thunderbird Version2.0.0.21
Mozilla ≫ Thunderbird Version2.0.0.22
Mozilla ≫ Thunderbird Version2.0.0.23
Mozilla ≫ Thunderbird Version3.0
Mozilla ≫ Thunderbird Version3.0.1
Mozilla ≫ Thunderbird Version3.0.2
Mozilla ≫ Thunderbird Version3.0.3
Mozilla ≫ Thunderbird Version3.0.4
Mozilla ≫ Thunderbird Version3.0.5
Mozilla ≫ Thunderbird Version3.0.6
Mozilla ≫ Thunderbird Version3.0.7
Mozilla ≫ Thunderbird Version3.0.8
Mozilla ≫ Thunderbird Version3.0.9
Mozilla ≫ Thunderbird Version3.0.10
Mozilla ≫ Thunderbird Version3.0.11
Mozilla ≫ Thunderbird Version3.1
Mozilla ≫ Thunderbird Version3.1.1
Mozilla ≫ Thunderbird Version3.1.2
Mozilla ≫ Thunderbird Version3.1.3
Mozilla ≫ Thunderbird Version3.1.4
Mozilla ≫ Thunderbird Version3.1.5
Mozilla ≫ Thunderbird Version3.1.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.88% | 0.745 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.