Closed Bug 276234 Opened 20 years ago Closed 20 years ago

Dialog Spoofing Vulnerability

Categories

(Firefox :: General, defect)

1.0 Branch
defect
Not set
normal

Tracking

()

VERIFIED INVALID

People

(Reporter: kelly_worth2003, Assigned: bugzilla)

References

()

Details

Vulnerability:"Window injection Vulnerability" 

found this Vulnerability on http://secunia.com/product/4227/ 

The problem is that a website can inject content into another site's window if
the target name of the window is known. This can e.g. be exploited by a
malicious website to spoof the content of a pop-up window opened on a trusted
website. 

This Vulnerability can be eliminated by selecting the load images from
originating   website only. of course then images from a particular website such
as http://www.amazon.co.uk wouldnt load.
The url listed in this bug is Secunia's Firefox vulnerability page. Each of the
four vulnerabilities listed at the page have separate bugs in bugzilla. All
advisory pages look like http://secunia.com/advisories/ then some number not
http://secunia.com/product/ then some number.
Status: UNCONFIRMED → RESOLVED
Closed: 20 years ago
OS: Linux → All
Hardware: PC → All
Resolution: --- → INVALID
Status: RESOLVED → VERIFIED
the correct advisory <http://secunia.com/advisories/13129/> event mentions the
bugzilla number : bug 273699

Very good work. You can visit this https://bit.ly/3hf9Onn

Thanks

You need to log in before you can comment on or make changes to this bug.