TROYANOSYVIRUS
Back to CVEs

CVE-2008-0418

N/A

Description

Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.

CVE Details

CVSS v3.1 ScoreN/A
Published2/8/2008
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0

Affected Products

mozilla:firefoxmozilla:seamonkeymozilla:thunderbird

Weaknesses (CWE)

CWE-22

References

http://browser.netscape.com/releasenotes/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28622/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28754(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28766(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28808(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28815(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28818(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28839(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28864(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28865(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28877(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28879(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28924(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28939(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28958(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29049(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29086(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29098(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29164(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29167(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29211(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29567(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30327(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30620(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/31043(af854a3a-2127-422b-91ae-364da2661108)
http://wiki.rpath.com/Advisories:rPSA-2008-0051(af854a3a-2127-422b-91ae-364da2661108)
http://wiki.rpath.com/Advisories:rPSA-2008-0093(af854a3a-2127-422b-91ae-364da2661108)
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1484(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1485(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1489(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1506(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/309608(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2008-0103.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2008-0104.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2008-0105.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/27406(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1019329(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-576-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-582-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-582-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0263(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-1995(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.