browser.js in Mozilla Firefox 1.5.x prior to 1.5.0.10 and 2.x prior to 2.0.0.2, and SeaMonkey prior to 1.0.8 uses the requesting URI to identify child windows, which allows remote malicious users to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox |
||
mozilla seamonkey |
||
canonical ubuntu linux 5.10 |
||
canonical ubuntu linux 6.06 |
||
canonical ubuntu linux 6.10 |