Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-2802

Опубликовано: 02 июл. 2008
Источник: redhat

Описание

Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=452600Firefox arbitrary JavaScript code execution

Связанные уязвимости

ubuntu
около 17 лет назад

Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."

nvd
около 17 лет назад

Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."

debian
около 17 лет назад

Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and ...

github
больше 3 лет назад

Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."

oracle-oval
около 17 лет назад

ELSA-2008-0569: firefox security update (CRITICAL)