Lucene search

K
cveRedhatCVE-2008-1235
HistoryMar 27, 2008 - 10:44 a.m.

CVE-2008-1235

2008-03-2710:44:00
redhat
web.nvd.nist.gov
49
cve-2008-1235
mozilla firefox
thunderbird
seamonkey
vulnerability
remote code execution
privilege escalation
javascript

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

9.8

Confidence

High

EPSS

0.461

Percentile

97.5%

Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka “Privilege escalation via incorrect principals.”

Affected configurations

Nvd
Node
mozillafirefoxRange2.0.0.12
OR
mozillafirefoxMatch0.1
OR
mozillafirefoxMatch0.2
OR
mozillafirefoxMatch0.4
OR
mozillafirefoxMatch0.5
OR
mozillafirefoxMatch0.6
OR
mozillafirefoxMatch0.6.1
OR
mozillafirefoxMatch0.7
OR
mozillafirefoxMatch0.7.1
OR
mozillafirefoxMatch0.8
OR
mozillafirefoxMatch0.9
OR
mozillafirefoxMatch0.9.1
OR
mozillafirefoxMatch0.9.2
OR
mozillafirefoxMatch0.9.3
OR
mozillafirefoxMatch1.0
OR
mozillafirefoxMatch1.0preview_release
OR
mozillafirefoxMatch1.0.1
OR
mozillafirefoxMatch1.0.2
OR
mozillafirefoxMatch1.0.3
OR
mozillafirefoxMatch1.0.4
OR
mozillafirefoxMatch1.0.5
OR
mozillafirefoxMatch1.0.6
OR
mozillafirefoxMatch1.0.7
OR
mozillafirefoxMatch1.0.8
OR
mozillafirefoxMatch1.5
OR
mozillafirefoxMatch1.5.0.1
OR
mozillafirefoxMatch1.5.0.2
OR
mozillafirefoxMatch1.5.0.3
OR
mozillafirefoxMatch1.5.0.4
OR
mozillafirefoxMatch1.5.0.5
OR
mozillafirefoxMatch1.5.0.6
OR
mozillafirefoxMatch1.5.0.7
OR
mozillafirefoxMatch1.5.0.8
OR
mozillafirefoxMatch1.5.0.9
OR
mozillafirefoxMatch1.5.0.10
OR
mozillafirefoxMatch1.5.0.11
OR
mozillafirefoxMatch1.5.0.12
OR
mozillafirefoxMatch2.0
OR
mozillafirefoxMatch2.0.0.1
OR
mozillafirefoxMatch2.0.0.2
OR
mozillafirefoxMatch2.0.0.3
OR
mozillafirefoxMatch2.0.0.4
OR
mozillafirefoxMatch2.0.0.5
OR
mozillafirefoxMatch2.0.0.6
OR
mozillafirefoxMatch2.0.0.7
OR
mozillafirefoxMatch2.0.0.8
OR
mozillafirefoxMatch2.0.0.9
OR
mozillafirefoxMatch2.0.0.10
OR
mozillafirefoxMatch2.0.0.11
OR
mozillaseamonkeyRange1.1.8
OR
mozillaseamonkeyMatch1.0
OR
mozillaseamonkeyMatch1.0alpha
OR
mozillaseamonkeyMatch1.0beta
OR
mozillaseamonkeyMatch1.0.1
OR
mozillaseamonkeyMatch1.0.2
OR
mozillaseamonkeyMatch1.0.3
OR
mozillaseamonkeyMatch1.0.4
OR
mozillaseamonkeyMatch1.0.5
OR
mozillaseamonkeyMatch1.0.6
OR
mozillaseamonkeyMatch1.0.7
OR
mozillaseamonkeyMatch1.0.8
OR
mozillaseamonkeyMatch1.0.9
OR
mozillaseamonkeyMatch1.1
OR
mozillaseamonkeyMatch1.1alpha
OR
mozillaseamonkeyMatch1.1beta
OR
mozillaseamonkeyMatch1.1.1
OR
mozillaseamonkeyMatch1.1.2
OR
mozillaseamonkeyMatch1.1.3
OR
mozillaseamonkeyMatch1.1.4
OR
mozillaseamonkeyMatch1.1.5
OR
mozillaseamonkeyMatch1.1.6
OR
mozillaseamonkeyMatch1.1.7
OR
mozillathunderbirdRange2.0.0.12
OR
mozillathunderbirdMatch0.1
OR
mozillathunderbirdMatch0.2
OR
mozillathunderbirdMatch0.3
OR
mozillathunderbirdMatch0.4
OR
mozillathunderbirdMatch0.5
OR
mozillathunderbirdMatch0.6
OR
mozillathunderbirdMatch0.7
OR
mozillathunderbirdMatch0.8
OR
mozillathunderbirdMatch0.9
OR
mozillathunderbirdMatch1.0
OR
mozillathunderbirdMatch1.0.2
OR
mozillathunderbirdMatch1.0.4
OR
mozillathunderbirdMatch1.0.5
OR
mozillathunderbirdMatch1.0.6
OR
mozillathunderbirdMatch1.0.7
OR
mozillathunderbirdMatch1.0.8
OR
mozillathunderbirdMatch1.5
OR
mozillathunderbirdMatch1.5.0.2
OR
mozillathunderbirdMatch1.5.0.4
OR
mozillathunderbirdMatch1.5.0.5
OR
mozillathunderbirdMatch1.5.0.7
OR
mozillathunderbirdMatch1.5.0.8
OR
mozillathunderbirdMatch1.5.0.9
OR
mozillathunderbirdMatch1.5.0.10
OR
mozillathunderbirdMatch1.5.0.12
OR
mozillathunderbirdMatch1.5.0.13
OR
mozillathunderbirdMatch1.5.0.14
OR
mozillathunderbirdMatch2.0.0.0
OR
mozillathunderbirdMatch2.0.0.4
OR
mozillathunderbirdMatch2.0.0.5
OR
mozillathunderbirdMatch2.0.0.6
OR
mozillathunderbirdMatch2.0.0.9
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillafirefox0.1cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*
mozillafirefox0.2cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*
mozillafirefox0.4cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*
mozillafirefox0.5cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*
mozillafirefox0.6cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*
mozillafirefox0.6.1cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*
mozillafirefox0.7cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*
mozillafirefox0.7.1cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*
mozillafirefox0.8cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 1051

References

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

9.8

Confidence

High

EPSS

0.461

Percentile

97.5%