Informazioni sul CVE-2008-4065
N/A
CWE ID: N/A
Base Score (CVSS): N/A
CVE: CVE-2008-4065
Descrizione: Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka “Stripped BOM characters bug.”
Vettore di attacco
Punteggio CVSS
Il CVSS è un sistema di valutazione che misura la gravità di una vulnerabilità informatica considerando fattori come l’impatto potenziale, la probabilità di attacco e la facilità di esecuzione.
Punteggio Base (calcolato da AziendaSicura): 0.0 (None)
Riassunto: .
Dettaglio del Vettore
Metrica | Valore | Significato | Descrizione |
---|
Riferimenti esterni
- http://www.mozilla.org/security/announce/2008/mfsa2008-43.html
- http://secunia.com/advisories/32025
- http://secunia.com/advisories/32011
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
- http://www.debian.org/security/2009/dsa-1697
- http://www.securitytracker.com/id?1020920
- http://secunia.com/advisories/32096
- https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
- http://www.ubuntu.com/usn/usn-645-1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11383
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
- http://secunia.com/advisories/32144
- http://secunia.com/advisories/32010
- http://www.vupen.com/english/advisories/2009/0977
- http://www.ubuntu.com/usn/usn-645-2
- http://www.securityfocus.com/bid/31346
- http://secunia.com/advisories/31985
- http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
- http://secunia.com/advisories/31984
- http://secunia.com/advisories/32185
- http://secunia.com/advisories/32196
- https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
- http://www.debian.org/security/2008/dsa-1669
- http://secunia.com/advisories/32042
- http://secunia.com/advisories/33433
- http://www.vupen.com/english/advisories/2008/2661
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
- http://secunia.com/advisories/32095
- http://secunia.com/advisories/32089
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
- http://secunia.com/advisories/32092
- http://www.redhat.com/support/errata/RHSA-2008-0879.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
- http://www.debian.org/security/2009/dsa-1696
- http://download.novell.com/Download?buildid=WZXONb-tqBw~
- https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
- http://secunia.com/advisories/31987
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45356
- https://bugzilla.mozilla.org/show_bug.cgi?id=430740
- http://www.ubuntu.com/usn/usn-647-1
- http://secunia.com/advisories/32007
- http://www.redhat.com/support/errata/RHSA-2008-0882.html
- http://secunia.com/advisories/32845
- http://www.debian.org/security/2008/dsa-1649
- http://secunia.com/advisories/32012
- http://secunia.com/advisories/33434
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
- http://secunia.com/advisories/32044
- http://www.redhat.com/support/errata/RHSA-2008-0908.html
- http://secunia.com/advisories/34501
- http://secunia.com/advisories/32082
Prodotti interessati
- n/a – n/a
Relazioni con altri prodotti
Nessun prodotto trovato per il CVE: cve-2008-4065