CVE-2008-1235

Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
http://rhn.redhat.com/errata/RHSA-2008-0208.html
http://secunia.com/advisories/29391 Vendor Advisory
http://secunia.com/advisories/29526 Vendor Advisory
http://secunia.com/advisories/29539 Vendor Advisory
http://secunia.com/advisories/29541 Vendor Advisory
http://secunia.com/advisories/29547 Vendor Advisory
http://secunia.com/advisories/29548 Vendor Advisory
http://secunia.com/advisories/29550 Vendor Advisory
http://secunia.com/advisories/29558 Vendor Advisory
http://secunia.com/advisories/29560 Vendor Advisory
http://secunia.com/advisories/29607 Vendor Advisory
http://secunia.com/advisories/29616 Vendor Advisory
http://secunia.com/advisories/29645 Vendor Advisory
http://secunia.com/advisories/30016 Vendor Advisory
http://secunia.com/advisories/30094 Vendor Advisory
http://secunia.com/advisories/30105 Vendor Advisory
http://secunia.com/advisories/30192 Vendor Advisory
http://secunia.com/advisories/30327 Vendor Advisory
http://secunia.com/advisories/30370 Vendor Advisory
http://secunia.com/advisories/30620 Vendor Advisory
http://secunia.com/advisories/31043 Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
http://www.debian.org/security/2008/dsa-1532
http://www.debian.org/security/2008/dsa-1534
http://www.debian.org/security/2008/dsa-1535
http://www.debian.org/security/2008/dsa-1574
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.kb.cert.org/vuls/id/466521 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
http://www.mozilla.org/security/announce/2008/mfsa2008-14.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2008-0207.html
http://www.redhat.com/support/errata/RHSA-2008-0209.html
http://www.securityfocus.com/archive/1/490196/100/0/threaded
http://www.securityfocus.com/bid/28448
http://www.securitytracker.com/id?1019694
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313
http://www.ubuntu.com/usn/usn-592-1
http://www.ubuntu.com/usn/usn-605-1
http://www.us-cert.gov/cas/techalerts/TA08-087A.html US Government Resource
http://www.vupen.com/english/advisories/2008/0998/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/0999/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1793/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/2091/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41457
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10980
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
http://rhn.redhat.com/errata/RHSA-2008-0208.html
http://secunia.com/advisories/29391 Vendor Advisory
http://secunia.com/advisories/29526 Vendor Advisory
http://secunia.com/advisories/29539 Vendor Advisory
http://secunia.com/advisories/29541 Vendor Advisory
http://secunia.com/advisories/29547 Vendor Advisory
http://secunia.com/advisories/29548 Vendor Advisory
http://secunia.com/advisories/29550 Vendor Advisory
http://secunia.com/advisories/29558 Vendor Advisory
http://secunia.com/advisories/29560 Vendor Advisory
http://secunia.com/advisories/29607 Vendor Advisory
http://secunia.com/advisories/29616 Vendor Advisory
http://secunia.com/advisories/29645 Vendor Advisory
http://secunia.com/advisories/30016 Vendor Advisory
http://secunia.com/advisories/30094 Vendor Advisory
http://secunia.com/advisories/30105 Vendor Advisory
http://secunia.com/advisories/30192 Vendor Advisory
http://secunia.com/advisories/30327 Vendor Advisory
http://secunia.com/advisories/30370 Vendor Advisory
http://secunia.com/advisories/30620 Vendor Advisory
http://secunia.com/advisories/31043 Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
http://www.debian.org/security/2008/dsa-1532
http://www.debian.org/security/2008/dsa-1534
http://www.debian.org/security/2008/dsa-1535
http://www.debian.org/security/2008/dsa-1574
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.kb.cert.org/vuls/id/466521 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
http://www.mozilla.org/security/announce/2008/mfsa2008-14.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2008-0207.html
http://www.redhat.com/support/errata/RHSA-2008-0209.html
http://www.securityfocus.com/archive/1/490196/100/0/threaded
http://www.securityfocus.com/bid/28448
http://www.securitytracker.com/id?1019694
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313
http://www.ubuntu.com/usn/usn-592-1
http://www.ubuntu.com/usn/usn-605-1
http://www.us-cert.gov/cas/techalerts/TA08-087A.html US Government Resource
http://www.vupen.com/english/advisories/2008/0998/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/0999/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1793/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/2091/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41457
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10980
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html -
References () http://rhn.redhat.com/errata/RHSA-2008-0208.html - () http://rhn.redhat.com/errata/RHSA-2008-0208.html -
References () http://secunia.com/advisories/29391 - Vendor Advisory () http://secunia.com/advisories/29391 - Vendor Advisory
References () http://secunia.com/advisories/29526 - Vendor Advisory () http://secunia.com/advisories/29526 - Vendor Advisory
References () http://secunia.com/advisories/29539 - Vendor Advisory () http://secunia.com/advisories/29539 - Vendor Advisory
References () http://secunia.com/advisories/29541 - Vendor Advisory () http://secunia.com/advisories/29541 - Vendor Advisory
References () http://secunia.com/advisories/29547 - Vendor Advisory () http://secunia.com/advisories/29547 - Vendor Advisory
References () http://secunia.com/advisories/29548 - Vendor Advisory () http://secunia.com/advisories/29548 - Vendor Advisory
References () http://secunia.com/advisories/29550 - Vendor Advisory () http://secunia.com/advisories/29550 - Vendor Advisory
References () http://secunia.com/advisories/29558 - Vendor Advisory () http://secunia.com/advisories/29558 - Vendor Advisory
References () http://secunia.com/advisories/29560 - Vendor Advisory () http://secunia.com/advisories/29560 - Vendor Advisory
References () http://secunia.com/advisories/29607 - Vendor Advisory () http://secunia.com/advisories/29607 - Vendor Advisory
References () http://secunia.com/advisories/29616 - Vendor Advisory () http://secunia.com/advisories/29616 - Vendor Advisory
References () http://secunia.com/advisories/29645 - Vendor Advisory () http://secunia.com/advisories/29645 - Vendor Advisory
References () http://secunia.com/advisories/30016 - Vendor Advisory () http://secunia.com/advisories/30016 - Vendor Advisory
References () http://secunia.com/advisories/30094 - Vendor Advisory () http://secunia.com/advisories/30094 - Vendor Advisory
References () http://secunia.com/advisories/30105 - Vendor Advisory () http://secunia.com/advisories/30105 - Vendor Advisory
References () http://secunia.com/advisories/30192 - Vendor Advisory () http://secunia.com/advisories/30192 - Vendor Advisory
References () http://secunia.com/advisories/30327 - Vendor Advisory () http://secunia.com/advisories/30327 - Vendor Advisory
References () http://secunia.com/advisories/30370 - Vendor Advisory () http://secunia.com/advisories/30370 - Vendor Advisory
References () http://secunia.com/advisories/30620 - Vendor Advisory () http://secunia.com/advisories/30620 - Vendor Advisory
References () http://secunia.com/advisories/31043 - Vendor Advisory () http://secunia.com/advisories/31043 - Vendor Advisory
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 -
References () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128 - () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128 -
References () http://www.debian.org/security/2008/dsa-1532 - () http://www.debian.org/security/2008/dsa-1532 -
References () http://www.debian.org/security/2008/dsa-1534 - () http://www.debian.org/security/2008/dsa-1534 -
References () http://www.debian.org/security/2008/dsa-1535 - () http://www.debian.org/security/2008/dsa-1535 -
References () http://www.debian.org/security/2008/dsa-1574 - () http://www.debian.org/security/2008/dsa-1574 -
References () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml - () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml -
References () http://www.kb.cert.org/vuls/id/466521 - US Government Resource () http://www.kb.cert.org/vuls/id/466521 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:080 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:080 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 -
References () http://www.mozilla.org/security/announce/2008/mfsa2008-14.html - Patch, Vendor Advisory () http://www.mozilla.org/security/announce/2008/mfsa2008-14.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2008-0207.html - () http://www.redhat.com/support/errata/RHSA-2008-0207.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0209.html - () http://www.redhat.com/support/errata/RHSA-2008-0209.html -
References () http://www.securityfocus.com/archive/1/490196/100/0/threaded - () http://www.securityfocus.com/archive/1/490196/100/0/threaded -
References () http://www.securityfocus.com/bid/28448 - () http://www.securityfocus.com/bid/28448 -
References () http://www.securitytracker.com/id?1019694 - () http://www.securitytracker.com/id?1019694 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313 -
References () http://www.ubuntu.com/usn/usn-592-1 - () http://www.ubuntu.com/usn/usn-592-1 -
References () http://www.ubuntu.com/usn/usn-605-1 - () http://www.ubuntu.com/usn/usn-605-1 -
References () http://www.us-cert.gov/cas/techalerts/TA08-087A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-087A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2008/0998/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0998/references - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/0999/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0999/references - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/1793/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/1793/references - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/2091/references - () http://www.vupen.com/english/advisories/2008/2091/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41457 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41457 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10980 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10980 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html - () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html - () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html -

Information

Published : 2008-03-27 10:44

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1235

Mitre link : CVE-2008-1235

CVE.ORG link : CVE-2008-1235


JSON object : View

Products Affected

mozilla

  • thunderbird
  • firefox
  • seamonkey