The docshell implementation in Mozilla Firefox prior to 29.0, Firefox ESR 24.x prior to 24.5, Thunderbird prior to 24.5, and SeaMonkey prior to 2.26 allows remote malicious users to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla thunderbird |
||
mozilla firefox |
||
mozilla firefox esr |
||
mozilla seamonkey |
||
fedoraproject fedora 20 |
||
fedoraproject fedora 19 |
||
canonical ubuntu linux 13.10 |
||
canonical ubuntu linux 12.10 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 14.04 |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux server eus 6.5 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux server aus 6.5 |
||
redhat enterprise linux server tus 6.5 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux eus 6.5 |
||
opensuse opensuse 12.3 |
||
opensuse opensuse 11.4 |
||
opensuse opensuse 13.1 |
||
suse suse linux enterprise server 11 |
||
suse suse linux enterprise server 10 |