CVE-2007-0994

N/A Unknown
Published: March 06, 2007 Modified: April 23, 2026
View on NVD

Description

A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733
Source: secalert@redhat.com
Exploit Issue Tracking Patch Third Party Advisory
http://secunia.com/advisories/24384
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/24395
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/24455
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/24457
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/24650
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/25588
Source: secalert@redhat.com
Third Party Advisory
http://securitytracker.com/id?1017726
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.debian.org/security/2007/dsa-1336
Source: secalert@redhat.com
Third Party Advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html
Source: secalert@redhat.com
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0078.html
Source: secalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html
Source: secalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/bid/22826
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/0823
Source: secalert@redhat.com
Third Party Advisory
https://issues.rpath.com/browse/RPL-1103
Source: secalert@redhat.com
Broken Link
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking Patch Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24384
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/24395
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/24455
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/24457
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/24650
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/25588
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1017726
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.debian.org/security/2007/dsa-1336
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0078.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/22826
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/0823
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://issues.rpath.com/browse/RPL-1103
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

46 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
3.2%
87th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian mozilla