4.3
CVSSv2

CVE-2012-1966

Published: 18/07/2012 Updated: 29/12/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox 4.x up to and including 13.0 and Firefox ESR 10.x prior to 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via a crafted URL.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 4.0

mozilla firefox 7.0

mozilla firefox 8.0

mozilla firefox 5.0

mozilla firefox 5.0.1

mozilla firefox 8.0.1

mozilla firefox 9.0.1

mozilla firefox 9.0

mozilla firefox 4.0.1

mozilla firefox 6.0

mozilla firefox 6.0.2

mozilla firefox 11.0

mozilla firefox 12.0

mozilla firefox 6.0.1

mozilla firefox 7.0.1

mozilla firefox 13.0

mozilla firefox esr 10.0.1

mozilla firefox esr 10.0.2

mozilla firefox esr 10.0.3

mozilla firefox esr 10.0.4

mozilla firefox esr 10.0

mozilla firefox esr 10.0.5

Vendor Advisories

Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having criticalsecurity impact Common Vulne ...
This update provides compatible ubufox packages for the latest Firefox ...
Several security issues were fixed in Firefox ...
Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox The included XULRunner library provides rendering services for several other applications included in Debian CVE-2012-1948 Benoit Jacob, Jesse Ruderman, Christian Holler, and Bill McCloskey identified several memory safety problems that may lead to ...
Mozilla Foundation Security Advisory 2012-46 XSS through data: URLs Announced July 17, 2012 Reporter moz_bug_r_a4 Impact High Products Firefox, Firefox ESR Fixed in Firefox 14 ...