mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
122 lines
4.1 KiB
JSON
122 lines
4.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2006-0299",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The E4X implementation in Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 exposes the internal \"AnyName\" object to external interfaces, which allows multiple cooperating domains to exchange information in violation of the same origin restrictions."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "oval:org.mitre.oval:def:1625",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1625"
|
|
},
|
|
{
|
|
"name": "mozilla-e4x-security-bypass(24437)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24437"
|
|
},
|
|
{
|
|
"name": "18704",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/18704"
|
|
},
|
|
{
|
|
"name": "ADV-2006-3749",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/3749"
|
|
},
|
|
{
|
|
"name": "16476",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/16476"
|
|
},
|
|
{
|
|
"name": "ADV-2006-0413",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/0413"
|
|
},
|
|
{
|
|
"name": "1015570",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1015570"
|
|
},
|
|
{
|
|
"name": "18700",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/18700"
|
|
},
|
|
{
|
|
"name": "SSRT061236",
|
|
"refsource": "HP",
|
|
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
|
|
},
|
|
{
|
|
"name": "HPSBUX02156",
|
|
"refsource": "HP",
|
|
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
|
|
},
|
|
{
|
|
"name": "22065",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/22065"
|
|
},
|
|
{
|
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=322312",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=322312"
|
|
},
|
|
{
|
|
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-08.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-08.html"
|
|
}
|
|
]
|
|
}
|
|
} |