Vulnerability Note VU#243153
Mozilla may associate persisted XUL attributes with an incorrect URL
Mozilla can allow persisted XUL attributes to associate with the wrong URL. This may allow a remote attacker to execute arbitrary code.
XUL is an XML-based user interface language, which is used by Mozilla.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Apply an update
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Mozilla, Inc.||Affected||-||02 Jun 2006|
CVSS Metrics (Learn More)
Thanks to Mozilla Foundation Security Advisory for reporting this vulnerability, who in turn credit Jonas Sicking.
This document was written by Will Dormann.
- CVE IDs: CVE-2006-2775
- Date Public: 01 Jun 2006
- Date First Published: 02 Jun 2006
- Date Last Updated: 09 Feb 2007
- Severity Metric: 11.48
- Document Revision: 14
If you have feedback, comments, or additional information about this vulnerability, please send us email.