Cross site scripting vulnerability in Mozilla Firefox or Firefox ESR by appending whitespace characters to an IP address string (Mac OS X)ID: oval:org.secpod.oval:def:31618 | Date: (C)2015-11-24 (M)2024-01-29 |
Class: VULNERABILITY | Family: macos |
The host is installed with Mozilla Firefox before 42.0 or Firefox ESR 38.x before 38.4 and is prone to a cross site scripting vulnerability. A flaw is present in the applications, which fail to properly handle whitepsace characters in an IP address string. Successful exploitation could allow remote attackers to bypass the Same Origin Policy for an IP address origin.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.11 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.10 |
Product: |
Mozilla Firefox |
Mozilla Firefox ESR |