The Script.prototype.freeze/thaw functionality in Mozilla 1.4 and earlier allows attackers to execute native methods by modifying the string used as input to the script.thaw JavaScript function, which is then deserialized and executed.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/11103/ | URL Repurposed | 
| http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 | Broken Link | 
| http://www.osvdb.org/8390 | Broken Link Patch Vendor Advisory | 
| http://www.securityfocus.com/advisories/6979 | Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory | 
| http://www.securityfocus.com/bid/9322 | Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory | 
| https://bugzilla.mozilla.org/show_bug.cgi?id=221526 | Issue Tracking Patch Vendor Advisory | 
| http://secunia.com/advisories/11103/ | URL Repurposed | 
| http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 | Broken Link | 
| http://www.osvdb.org/8390 | Broken Link Patch Vendor Advisory | 
| http://www.securityfocus.com/advisories/6979 | Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory | 
| http://www.securityfocus.com/bid/9322 | Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory | 
| https://bugzilla.mozilla.org/show_bug.cgi?id=221526 | Issue Tracking Patch Vendor Advisory | 
Configurations
                    History
                    20 Nov 2024, 23:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/11103/ - URL Repurposed | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - Broken Link | |
| References | () http://www.osvdb.org/8390 - Broken Link, Patch, Vendor Advisory | |
| References | () http://www.securityfocus.com/advisories/6979 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/9322 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Issue Tracking, Patch, Vendor Advisory | 
25 Jan 2024, 02:14
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 7.5 v3 : 9.8 | 
| CWE | CWE-502 | |
| CPE | cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:* | cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:* | 
| References | (SCO) http://www.securityfocus.com/advisories/6979 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
| References | (SECUNIA) http://secunia.com/advisories/11103/ - URL Repurposed | |
| References | (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Issue Tracking, Patch, Vendor Advisory | |
| References | (BID) http://www.securityfocus.com/bid/9322 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
| References | (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - Broken Link | |
| References | (OSVDB) http://www.osvdb.org/8390 - Broken Link, Patch, Vendor Advisory | 
Information
                Published : 2003-10-07 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-0791
Mitre link : CVE-2003-0791
CVE.ORG link : CVE-2003-0791
JSON object : View
Products Affected
                sco
- openserver
mozilla
- mozilla
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
