Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka "Stripped BOM characters bug."
2008-09-24T20:37:04.703
2025-04-09T00:30:58.490
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | firefox | < 2.0.0.17 | Yes |
Application | mozilla | firefox | < 3.0.2 | Yes |
Application | mozilla | seamonkey | < 1.1.12 | Yes |
Application | mozilla | thunderbird | < 2.0.0.17 | Yes |
Operating System | debian | debian_linux | 4.0 | Yes |
Operating System | canonical | ubuntu_linux | 6.06 | Yes |
Operating System | canonical | ubuntu_linux | 7.04 | Yes |
Operating System | canonical | ubuntu_linux | 7.10 | Yes |
Operating System | canonical | ubuntu_linux | 8.04 | Yes |