CVE-2006-1741
Published Apr 14, 2006
Last updated 6 years ago
Overview
- Description
- Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) "using a modal alert to suspend an event handler while a new page is being loaded", (2) using eval(), and using certain variants involving (3) "new Script;" and (4) using window.__proto__ to extend eval, aka "cross-site JavaScript injection".
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F71241D-928E-43B4-82ED-5C27FEE1CDB2", "versionEndExcluding": "1.0.8", "versionStartIncluding": "1.0" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABB88E86-6E83-4A59-9266-8B98AA91774D" }, { "criteria": "cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7DD4CED-138F-415C-9F00-583D92BB3C3E", "versionEndExcluding": "1.7.13" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB8DE1B0-ACE1-4720-91AE-3C85EF754387", "versionEndExcluding": "1.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "778A6957-455B-420A-BAAF-E7F88FF4FB1E" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42E47538-08EE-4DC1-AC17-883C44CF77BB" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FA3A32E-445A-4D39-A8D5-75F5370AD23D" } ], "operator": "OR" } ] } ]