Directory traversal vulnerability in Mozilla Firefox before 126.96.36.199 and 3.x before 3.0.2, Thunderbird before 188.8.131.52, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
Publish Date : 2008-09-24 Last Update Date : 2012-10-29
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify
a vulnerability or a missing patch. Check out the OVAL definitions
if you want to learn what you should do to verify a vulnerability.