The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:06
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt - | |
| References | () ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U - | |
| References | () http://secunia.com/advisories/18700 - | |
| References | () http://secunia.com/advisories/18703 - | |
| References | () http://secunia.com/advisories/18704 - | |
| References | () http://secunia.com/advisories/18705 - | |
| References | () http://secunia.com/advisories/18706 - | |
| References | () http://secunia.com/advisories/18708 - | |
| References | () http://secunia.com/advisories/18709 - | |
| References | () http://secunia.com/advisories/19230 - | |
| References | () http://secunia.com/advisories/19746 - | |
| References | () http://secunia.com/advisories/19759 - | |
| References | () http://secunia.com/advisories/19780 - | |
| References | () http://secunia.com/advisories/19821 - | |
| References | () http://secunia.com/advisories/19823 - | |
| References | () http://secunia.com/advisories/19852 - | |
| References | () http://secunia.com/advisories/19862 - | |
| References | () http://secunia.com/advisories/19863 - | |
| References | () http://secunia.com/advisories/19902 - | |
| References | () http://secunia.com/advisories/19941 - | |
| References | () http://secunia.com/advisories/19950 - | |
| References | () http://secunia.com/advisories/20051 - | |
| References | () http://secunia.com/advisories/21033 - | |
| References | () http://secunia.com/advisories/21622 - | |
| References | () http://secunia.com/advisories/22065 - | |
| References | () http://securitytracker.com/id?1015570 - | |
| References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1 - | |
| References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1 - | |
| References | () http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm - | |
| References | () http://www.debian.org/security/2006/dsa-1044 - | |
| References | () http://www.debian.org/security/2006/dsa-1046 - | |
| References | () http://www.debian.org/security/2006/dsa-1051 - | |
| References | () http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml - | |
| References | () http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml - | |
| References | () http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml - | |
| References | () http://www.kb.cert.org/vuls/id/592425 - US Government Resource | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:036 - | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:037 - | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:078 - | |
| References | () http://www.mozilla.org/security/announce/2006/mfsa2006-05.html - | |
| References | () http://www.novell.com/linux/security/advisories/2006_04_25.html - | |
| References | () http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html - | |
| References | () http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html - | |
| References | () http://www.redhat.com/support/errata/RHSA-2006-0199.html - Vendor Advisory | |
| References | () http://www.redhat.com/support/errata/RHSA-2006-0200.html - Vendor Advisory | |
| References | () http://www.redhat.com/support/errata/RHSA-2006-0330.html - | |
| References | () http://www.securityfocus.com/archive/1/425975/100/0/threaded - | |
| References | () http://www.securityfocus.com/archive/1/425978/100/0/threaded - | |
| References | () http://www.securityfocus.com/archive/1/438730/100/0/threaded - | |
| References | () http://www.securityfocus.com/archive/1/446657/100/200/threaded - | |
| References | () http://www.securityfocus.com/bid/16476 - | |
| References | () http://www.us-cert.gov/cas/techalerts/TA06-038A.html - US Government Resource | |
| References | () http://www.vupen.com/english/advisories/2006/0413 - | |
| References | () http://www.vupen.com/english/advisories/2006/3391 - | |
| References | () http://www.vupen.com/english/advisories/2006/3749 - | |
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=319847 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24434 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11803 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1493 - | |
| References | () https://usn.ubuntu.com/271-1/ - | |
| References | () https://usn.ubuntu.com/275-1/ - | |
| References | () https://usn.ubuntu.com/276-1/ - | 
Information
                Published : 2006-02-02 20:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0296
Mitre link : CVE-2006-0296
CVE.ORG link : CVE-2006-0296
JSON object : View
Products Affected
                mozilla
- seamonkey
- firefox
CWE
                