fkie_cve-2008-1234
Vulnerability from fkie_nvd
Published
2008-03-27 10:44
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0208.html
secalert@redhat.comhttp://secunia.com/advisories/29391
secalert@redhat.comhttp://secunia.com/advisories/29526
secalert@redhat.comhttp://secunia.com/advisories/29539
secalert@redhat.comhttp://secunia.com/advisories/29541
secalert@redhat.comhttp://secunia.com/advisories/29547
secalert@redhat.comhttp://secunia.com/advisories/29548
secalert@redhat.comhttp://secunia.com/advisories/29550
secalert@redhat.comhttp://secunia.com/advisories/29558
secalert@redhat.comhttp://secunia.com/advisories/29560
secalert@redhat.comhttp://secunia.com/advisories/29607
secalert@redhat.comhttp://secunia.com/advisories/29616
secalert@redhat.comhttp://secunia.com/advisories/29645
secalert@redhat.comhttp://secunia.com/advisories/30016
secalert@redhat.comhttp://secunia.com/advisories/30094
secalert@redhat.comhttp://secunia.com/advisories/30105
secalert@redhat.comhttp://secunia.com/advisories/30192
secalert@redhat.comhttp://secunia.com/advisories/30327
secalert@redhat.comhttp://secunia.com/advisories/30370
secalert@redhat.comhttp://secunia.com/advisories/30620
secalert@redhat.comhttp://secunia.com/advisories/31043
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1532
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1534
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1535
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1574
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/466521US Government Resource
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:080
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:155
secalert@redhat.comhttp://www.mozilla.org/security/announce/2008/mfsa2008-14.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0207.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0209.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/490196/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/28448
secalert@redhat.comhttp://www.securitytracker.com/id?1019694
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-592-1
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-605-1
secalert@redhat.comhttp://www.us-cert.gov/cas/techalerts/TA08-087A.htmlUS Government Resource
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/0998/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/0999/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1793/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/2091/references
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/41455
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9551
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0208.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29391
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29526
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29539
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29541
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29547
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29548
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29550
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29558
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29560
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29607
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29616
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29645
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30016
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30094
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30105
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30192
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30327
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30370
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30620
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31043
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1532
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1534
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1535
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1574
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/466521US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/security/announce/2008/mfsa2008-14.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0207.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0209.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/490196/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28448
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019694
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-592-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-605-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA08-087A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0998/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0999/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1793/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2091/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41455
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9551
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
Impacted products
Vendor Product Version
mozilla firefox *
mozilla seamonkey *
mozilla thunderbird *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70186C3-B3C9-48A7-B282-37A9AB6F7726",
              "versionEndIncluding": "2.0.0.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DABC3E49-34F7-4748-B83F-6CF307230067",
              "versionEndIncluding": "1.1.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E85318C-5DC5-4DF4-945A-B3AB06B0F3F9",
              "versionEndIncluding": "2.0.0.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka \"Universal XSS using event handlers.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Mozilla Firefox versiones anteriores a 2.0.0.13, Thunderbird versiones anteriores a 2.0.0.13, y SeaMonkey versiones anteriores a 1.1.9 permite a atacantes remotos inyectar web script o HTML de su elecci\u00f3n a trav\u00e9s de gestores de eventos, tambi\u00e9n conocido como \"Universal XSS using event handlers.\""
    }
  ],
  "id": "CVE-2008-1234",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-27T10:44:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29391"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29526"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29539"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29541"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29547"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29548"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29550"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29558"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29560"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29607"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29616"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29645"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30016"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30094"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30105"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30192"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30327"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30370"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30620"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31043"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1532"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1534"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1535"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1574"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/466521"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:155"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-14.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/28448"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1019694"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.447313"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-592-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-605-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/0998/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/0999/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1793/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/2091/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41455"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9551"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29541"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29547"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29558"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29616"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29645"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30370"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30620"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1535"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1574"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/466521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-14.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28448"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.447313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-592-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-605-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0998/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0999/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1793/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2091/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…