Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2007-5338
Description:Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.
Test IDs: 1.3.6.1.4.1.25623.1.0.60657   1.3.6.1.4.1.25623.1.0.60655   1.3.6.1.4.1.25623.1.0.58732   1.3.6.1.4.1.25623.1.0.60653   1.3.6.1.4.1.25623.1.0.61025   1.3.6.1.4.1.25623.1.0.58695   1.3.6.1.4.1.25623.1.0.59840   1.3.6.1.4.1.25623.1.0.60862   1.3.6.1.4.1.25623.1.0.58689   1.3.6.1.4.1.25623.1.0.59819  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2007-5338
1018836
http://securitytracker.com/id?1018836
20071026 rPSA-2007-0225-1 firefox
http://www.securityfocus.com/archive/1/482876/100/200/threaded
20071029 FLEA-2007-0062-1 firefox
http://www.securityfocus.com/archive/1/482925/100/0/threaded
20071029 rPSA-2007-0225-2 firefox thunderbird
http://www.securityfocus.com/archive/1/482932/100/200/threaded
201516
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
26132
http://www.securityfocus.com/bid/26132
27276
http://secunia.com/advisories/27276
27298
http://secunia.com/advisories/27298
27311
http://secunia.com/advisories/27311
27315
http://secunia.com/advisories/27315
27325
http://secunia.com/advisories/27325
27327
http://secunia.com/advisories/27327
27335
http://secunia.com/advisories/27335
27336
http://secunia.com/advisories/27336
27356
http://secunia.com/advisories/27356
27360
http://secunia.com/advisories/27360
27383
http://secunia.com/advisories/27383
27387
http://secunia.com/advisories/27387
27403
http://secunia.com/advisories/27403
27414
http://secunia.com/advisories/27414
27425
http://secunia.com/advisories/27425
27480
http://secunia.com/advisories/27480
27665
http://secunia.com/advisories/27665
27680
http://secunia.com/advisories/27680
28398
http://secunia.com/advisories/28398
ADV-2007-3544
http://www.vupen.com/english/advisories/2007/3544
ADV-2007-3587
http://www.vupen.com/english/advisories/2007/3587
ADV-2008-0083
http://www.vupen.com/english/advisories/2008/0083
DSA-1392
http://www.debian.org/security/2007/dsa-1392
DSA-1396
http://www.debian.org/security/2007/dsa-1396
DSA-1401
http://www.debian.org/security/2007/dsa-1401
FEDORA-2007-2601
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html
FEDORA-2007-2664
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html
FEDORA-2007-3431
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html
GLSA-200711-14
http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml
HPSBUX02153
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
MDKSA-2007:202
http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202
RHSA-2007:0979
http://www.redhat.com/support/errata/RHSA-2007-0979.html
RHSA-2007:0980
http://www.redhat.com/support/errata/RHSA-2007-0980.html
RHSA-2007:0981
http://www.redhat.com/support/errata/RHSA-2007-0981.html
SSRT061181
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
SUSE-SA:2007:057
http://www.novell.com/linux/security/advisories/2007_57_mozilla.html
USN-535-1
https://usn.ubuntu.com/535-1/
USN-536-1
http://www.ubuntu.com/usn/usn-536-1
http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html
http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html
http://www.mozilla.org/security/announce/2007/mfsa2007-35.html
http://www.mozilla.org/security/announce/2007/mfsa2007-35.html
https://issues.rpath.com/browse/RPL-1858
https://issues.rpath.com/browse/RPL-1858
mozilla-xpcnativewrapper-code-execution(37288)
https://exchange.xforce.ibmcloud.com/vulnerabilities/37288
oval:org.mitre.oval:def:10965
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10965




© 1998-2025 E-Soft Inc. All rights reserved.