Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.
Link | Tags |
---|---|
http://secunia.com/multiple_browsers_window_injection_vulnerability_test/ | |
http://secunia.com/secunia_research/2004-13/advisory/ | vendor advisory |
http://secunia.com/advisories/13129/ | third party advisory vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10117 | vdb entry signature |
http://www.redhat.com/support/errata/RHSA-2005-176.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2005-384.html | vendor advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml | vendor advisory |
http://www.mozilla.org/security/announce/mfsa2005-13.html | |
http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100045 | vdb entry signature |