The evalInSandbox implementation in Mozilla Firefox prior to 17.0, Firefox ESR 10.x prior to 10.0.11, Thunderbird prior to 17.0, Thunderbird ESR 10.x prior to 10.0.11, and SeaMonkey prior to 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote malicious users to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox |
||
mozilla seamonkey |
||
mozilla thunderbird |
||
mozilla thunderbird esr |
||
mozilla firefox esr |
||
suse linux enterprise server 10 |
||
suse linux enterprise server 11 |
||
suse linux enterprise desktop 11 |
||
opensuse opensuse 11.4 |
||
opensuse opensuse 12.2 |
||
suse linux enterprise desktop 10 |
||
opensuse opensuse 12.1 |
||
suse linux enterprise software development kit 11 |
||
suse linux enterprise software development kit 10 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux eus 6.3 |
||
canonical ubuntu linux 11.10 |
||
canonical ubuntu linux 12.10 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 10.04 |
||
debian debian linux 7.0 |
||
debian debian linux 6.0 |