CVE-2007-0994

Public Exploit

Description

A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.

Category

6.8
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 2.50% Top 20%
Vendor Advisory redhat.com Vendor Advisory slackware.com Vendor Advisory debian.org Vendor Advisory hp.com Vendor Advisory suse.com Vendor Advisory novell.com Vendor Advisory redhat.com Vendor Advisory sgi.com Vendor Advisory sgi.com Vendor Advisory slackware.com Vendor Advisory mozilla.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.redhat.com/support/errata/RHSA-2007-0078.html third party advisory vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 vdb entry third party advisory signature
http://secunia.com/advisories/24395 third party advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 issue tracking patch exploit third party advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 mailing list third party advisory vendor advisory
http://secunia.com/advisories/24384 third party advisory
http://secunia.com/advisories/24457 third party advisory
http://www.debian.org/security/2007/dsa-1336 third party advisory vendor advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 vendor advisory broken link
http://secunia.com/advisories/24650 third party advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html vendor advisory
http://secunia.com/advisories/25588 third party advisory
https://issues.rpath.com/browse/RPL-1103 broken link
http://securitytracker.com/id?1017726 vdb entry third party advisory
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html vendor advisory broken link
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html vendor advisory broken link
http://www.vupen.com/english/advisories/2007/0823 vdb entry third party advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html third party advisory vendor advisory
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc vendor advisory broken link
http://secunia.com/advisories/24455 third party advisory
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc vendor advisory broken link
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 mailing list third party advisory vendor advisory
http://www.securityfocus.com/bid/22826 vdb entry third party advisory

Frequently Asked Questions

What is the severity of CVE-2007-0994?
CVE-2007-0994 has been scored as a medium severity vulnerability.
How to fix CVE-2007-0994?
To fix CVE-2007-0994, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2007-0994 being actively exploited in the wild?
It is possible that CVE-2007-0994 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~3% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.