CVE-2007-1095

N/A Unknown
Published: February 26, 2007 Modified: April 23, 2026
View on NVD

Description

Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/33809
Source: cve@mitre.org
http://secunia.com/advisories/27276
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27298
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27311
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27315
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27325
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27327
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27335
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27336
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27356
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27360
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27383
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27387
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27403
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27414
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27425
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27480
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27665
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27680
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28398
Source: cve@mitre.org
Vendor Advisory
https://usn.ubuntu.com/535-1/
Source: cve@mitre.org
http://lcamtuf.coredump.cx/ietrap/ff/
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/33809
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27276
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27298
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27311
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27315
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27325
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27327
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27335
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27336
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27356
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27360
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27383
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27387
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27403
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27414
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27425
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27480
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27665
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27680
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28398
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/2310
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1018837
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1392
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1396
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1401
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2007/mfsa2007-30.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0979.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0980.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0981.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/461007/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/461023/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/482876/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/482925/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/482932/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/22688
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-536-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3544
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3587
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0083
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=371360
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/32647
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/32649
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-1858
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/535-1/
Source: af854a3a-2127-422b-91ae-364da2661108

112 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.4%
89th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mozilla