Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-0296


The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.


Published

2006-02-02T20:06:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mozilla firefox 0.8 Yes
Application mozilla firefox 0.9 Yes
Application mozilla firefox 0.9 Yes
Application mozilla firefox 0.9.1 Yes
Application mozilla firefox 0.9.2 Yes
Application mozilla firefox 0.9.3 Yes
Application mozilla firefox 0.10 Yes
Application mozilla firefox 0.10.1 Yes
Application mozilla firefox 1.0 Yes
Application mozilla firefox 1.0.1 Yes
Application mozilla firefox 1.0.2 Yes
Application mozilla firefox 1.0.3 Yes
Application mozilla firefox 1.0.4 Yes
Application mozilla firefox 1.0.5 Yes
Application mozilla firefox 1.0.6 Yes
Application mozilla firefox 1.0.6 Yes
Application mozilla firefox 1.0.7 Yes
Application mozilla firefox 1.5 Yes
Application mozilla firefox 1.5 Yes
Application mozilla seamonkey 1.0 Yes
Application mozilla seamonkey 1.0 Yes

References