// For flags

CVE-2006-6919

Sage 1.3.6 - Input Validation

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Firefox Sage extension 1.3.8 and earlier allows remote attackers to execute arbitrary Javascript in the local context via an RSS feed with an img tag containing the script followed by an extra trailing ">", which Sage modifies to close the img element before the malicious script.

Extensión Sage de Firefox 1.3.8 y versiones anteriores permite a atacantes remotos ejecutar código JavaScript de su elección en el contexto local mediante una entrada RSS con una etiqueta img conteniendo el scirpt seguido por un extra ">" final, que Sage modifica para cerrar el elemento img antes del script maligno.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-09-08 First Exploit
  • 2007-01-11 CVE Reserved
  • 2007-01-11 CVE Published
  • 2023-11-15 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sage-mozdev
Search vendor "Sage-mozdev"
Sage
Search vendor "Sage-mozdev" for product "Sage"
<= 1.3.8
Search vendor "Sage-mozdev" for product "Sage" and version " <= 1.3.8"
-
Affected