CVE-2008-0416

Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allow remote attackers to inject arbitrary web script or HTML via certain character encodings, including (1) a backspace character that is treated as whitespace, (2) 0x80 with Shift_JIS encoding, and (3) "zero-length non-ASCII sequences" in certain Asian character sets.
References
Link Resource
http://jvn.jp/en/jp/JVN21563357/index.html
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000021.html
http://secunia.com/advisories/28839 Vendor Advisory
http://secunia.com/advisories/28864 Vendor Advisory
http://secunia.com/advisories/28865 Vendor Advisory
http://secunia.com/advisories/28879 Vendor Advisory
http://secunia.com/advisories/29541 Vendor Advisory
http://secunia.com/advisories/30327 Vendor Advisory
http://secunia.com/advisories/30620 Vendor Advisory
http://secunia.com/advisories/31043 Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
http://www.debian.org/security/2008/dsa-1484
http://www.debian.org/security/2008/dsa-1485
http://www.debian.org/security/2008/dsa-1489
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.mozilla.org/security/announce/2008/mfsa2008-13.html
http://www.securityfocus.com/bid/29303
http://www.turbolinux.com/security/2008/TLSA-2008-9.txt
http://www.ubuntu.com/usn/usn-592-1
http://www.us-cert.gov/cas/techalerts/TA08-087A.html US Government Resource
http://www.vupen.com/english/advisories/2008/1793/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/2091/references Vendor Advisory
https://bugzilla.mozilla.org/buglist.cgi?bug_id=404252%2C381412%2C407161
https://exchange.xforce.ibmcloud.com/vulnerabilities/40488
https://usn.ubuntu.com/576-1/
http://jvn.jp/en/jp/JVN21563357/index.html
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000021.html
http://secunia.com/advisories/28839 Vendor Advisory
http://secunia.com/advisories/28864 Vendor Advisory
http://secunia.com/advisories/28865 Vendor Advisory
http://secunia.com/advisories/28879 Vendor Advisory
http://secunia.com/advisories/29541 Vendor Advisory
http://secunia.com/advisories/30327 Vendor Advisory
http://secunia.com/advisories/30620 Vendor Advisory
http://secunia.com/advisories/31043 Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
http://www.debian.org/security/2008/dsa-1484
http://www.debian.org/security/2008/dsa-1485
http://www.debian.org/security/2008/dsa-1489
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.mozilla.org/security/announce/2008/mfsa2008-13.html
http://www.securityfocus.com/bid/29303
http://www.turbolinux.com/security/2008/TLSA-2008-9.txt
http://www.ubuntu.com/usn/usn-592-1
http://www.us-cert.gov/cas/techalerts/TA08-087A.html US Government Resource
http://www.vupen.com/english/advisories/2008/1793/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/2091/references Vendor Advisory
https://bugzilla.mozilla.org/buglist.cgi?bug_id=404252%2C381412%2C407161
https://exchange.xforce.ibmcloud.com/vulnerabilities/40488
https://usn.ubuntu.com/576-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:42

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN21563357/index.html - () http://jvn.jp/en/jp/JVN21563357/index.html -
References () http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000021.html - () http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000021.html -
References () http://secunia.com/advisories/28839 - Vendor Advisory () http://secunia.com/advisories/28839 - Vendor Advisory
References () http://secunia.com/advisories/28864 - Vendor Advisory () http://secunia.com/advisories/28864 - Vendor Advisory
References () http://secunia.com/advisories/28865 - Vendor Advisory () http://secunia.com/advisories/28865 - Vendor Advisory
References () http://secunia.com/advisories/28879 - Vendor Advisory () http://secunia.com/advisories/28879 - Vendor Advisory
References () http://secunia.com/advisories/29541 - Vendor Advisory () http://secunia.com/advisories/29541 - Vendor Advisory
References () http://secunia.com/advisories/30327 - Vendor Advisory () http://secunia.com/advisories/30327 - Vendor Advisory
References () http://secunia.com/advisories/30620 - Vendor Advisory () http://secunia.com/advisories/30620 - Vendor Advisory
References () http://secunia.com/advisories/31043 - Vendor Advisory () http://secunia.com/advisories/31043 - Vendor Advisory
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 -
References () http://www.debian.org/security/2008/dsa-1484 - () http://www.debian.org/security/2008/dsa-1484 -
References () http://www.debian.org/security/2008/dsa-1485 - () http://www.debian.org/security/2008/dsa-1485 -
References () http://www.debian.org/security/2008/dsa-1489 - () http://www.debian.org/security/2008/dsa-1489 -
References () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml - () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml -
References () http://www.mozilla.org/security/announce/2008/mfsa2008-13.html - () http://www.mozilla.org/security/announce/2008/mfsa2008-13.html -
References () http://www.securityfocus.com/bid/29303 - () http://www.securityfocus.com/bid/29303 -
References () http://www.turbolinux.com/security/2008/TLSA-2008-9.txt - () http://www.turbolinux.com/security/2008/TLSA-2008-9.txt -
References () http://www.ubuntu.com/usn/usn-592-1 - () http://www.ubuntu.com/usn/usn-592-1 -
References () http://www.us-cert.gov/cas/techalerts/TA08-087A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-087A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2008/1793/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/1793/references - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/2091/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/2091/references - Vendor Advisory
References () https://bugzilla.mozilla.org/buglist.cgi?bug_id=404252%2C381412%2C407161 - () https://bugzilla.mozilla.org/buglist.cgi?bug_id=404252%2C381412%2C407161 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/40488 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/40488 -
References () https://usn.ubuntu.com/576-1/ - () https://usn.ubuntu.com/576-1/ -

07 Nov 2023, 02:01

Type Values Removed Values Added
Summary Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allow remote attackers to inject arbitrary web script or HTML via certain character encodings, including (1) a backspace character that is treated as whitespace, (2) 0x80 with Shift_JIS encoding, and (3) "zero-length non-ASCII sequences" in certain Asian character sets. Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allow remote attackers to inject arbitrary web script or HTML via certain character encodings, including (1) a backspace character that is treated as whitespace, (2) 0x80 with Shift_JIS encoding, and (3) "zero-length non-ASCII sequences" in certain Asian character sets.

Information

Published : 2008-02-12 03:00

Updated : 2024-11-21 00:42


NVD link : CVE-2008-0416

Mitre link : CVE-2008-0416

CVE.ORG link : CVE-2008-0416


JSON object : View

Products Affected

mozilla

  • thunderbird
  • firefox
  • seamonkey
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')