Mozilla Firefox prior to 2.0.0.15 and SeaMonkey prior to 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote malicious users to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox 2.0.0.11 |
||
mozilla firefox 2.0.0.12 |
||
mozilla firefox 2.0 |
||
mozilla firefox 2.0_.1 |
||
mozilla seamonkey 1.1.1 |
||
mozilla seamonkey 1.1.2 |
||
mozilla seamonkey 1.1 |
||
mozilla thunderbird 2.0_.12 |
||
mozilla thunderbird 2.0_8 |
||
mozilla firefox 2.0_.9 |
||
mozilla firefox 2.0_8 |
||
mozilla seamonkey 1.1.8 |
||
mozilla seamonkey 1.1.9 |
||
mozilla thunderbird 2.0_.6 |
||
mozilla thunderbird 2.0_.9 |
||
mozilla firefox 2.0.0.2 |
||
mozilla firefox 2.0.0.3 |
||
mozilla firefox 2.0_.5 |
||
mozilla firefox 2.0_.6 |
||
mozilla seamonkey 1.1.5 |
||
mozilla seamonkey 1.1.6 |
||
mozilla seamonkey 1.1.7 |
||
mozilla thunderbird 2.0_.4 |
||
mozilla thunderbird 2.0_.5 |
||
mozilla firefox 2.0.0.13 |
||
mozilla firefox 2.0.0.14 |
||
mozilla firefox 2.0_.10 |
||
mozilla firefox 2.0_.4 |
||
mozilla seamonkey 1.1.3 |
||
mozilla seamonkey 1.1.4 |
||
mozilla thunderbird 2.0_.13 |
||
mozilla thunderbird 2.0_.14 |