Vulnerability Details : CVE-2008-1233
Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."
Vulnerability category: Execute code
Products affected by CVE-2008-1233
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1233
84.95%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1233
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2008-1233
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1233
-
http://www.vupen.com/english/advisories/2008/0998/references
-
http://www.redhat.com/support/errata/RHSA-2008-0209.html
-
http://rhn.redhat.com/errata/RHSA-2008-0208.html
-
http://www.securityfocus.com/archive/1/490196/100/0/threaded
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
-
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
-
http://www.debian.org/security/2008/dsa-1534
-
http://www.debian.org/security/2008/dsa-1535
-
http://www.securitytracker.com/id?1019694
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
-
http://www.mozilla.org/security/announce/2008/mfsa2008-14.html
-
http://www.debian.org/security/2008/dsa-1574
-
http://www.securityfocus.com/bid/28448
-
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
-
http://www.vupen.com/english/advisories/2008/0999/references
-
http://www.kb.cert.org/vuls/id/466521
US Government Resource
-
http://www.vupen.com/english/advisories/2008/2091/references
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41443
-
http://www.us-cert.gov/cas/techalerts/TA08-087A.html
US Government Resource
-
http://www.debian.org/security/2008/dsa-1532
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
-
http://www.redhat.com/support/errata/RHSA-2008-0207.html
-
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
-
http://www.vupen.com/english/advisories/2008/1793/references
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
-
http://www.ubuntu.com/usn/usn-592-1
-
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
-
http://www.ubuntu.com/usn/usn-605-1
Jump to