Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/RHSA-2004-110.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2004-112.html | vendor advisory |
http://marc.info/?l=bugtraq&m=108448379429944&w=2 | vendor advisory |
http://www.osvdb.org/4062 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15322 | vdb entry |
http://www.securityfocus.com/bid/9747 | vdb entry vendor advisory |
http://marc.info/?l=bugtraq&m=107774710729469&w=2 | mailing list |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A937 | vdb entry signature |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A874 | vdb entry signature |
http://bugzilla.mozilla.org/show_bug.cgi?id=227417 | exploit vendor advisory |