New Search

Mozilla XML Attribute Name Validation Vulnerability

oval:org.mitre.oval:def:1493

The XULDocument.persist function in Mozilla Firefox before 1.5.0.1 and SeaMonkey before 1.0 does not validate the attribute name which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Server 2003
  • Microsoft Windows XP
  • Microsoft Windows NT
  • Microsoft Windows 2000
Class:
vulnerability
Reference(s):
  • CVE-2006-0296
Product(s):
  • mozilla