// For flags

CVE-2008-0415

Mozilla arbitrary code execution

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."

Mozilla Firefox versiones anteriores a 2.0.0.12, Thunderbird versiones anteriores a 2.0.0.12, y SeaMonkey versiones anteriores a 1.1.8, permiten a atacantes remotos ejecutar scripts fuera de la caja de arena (sandbox) y realizar ataques de secuencias de comandos en sitios cruzados (XSS) a través de múltiples vectores incluyendo la función XMLDocument.load, también conocidos como "bugs de escalado de privilegios en JavaScript".<

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-01-23 CVE Reserved
  • 2008-02-08 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (67)
URL Tag Source
http://browser.netscape.com/releasenotes X_refsource_confirm
http://secunia.com/advisories/28754 Third Party Advisory
http://secunia.com/advisories/28758 Third Party Advisory
http://secunia.com/advisories/28766 Third Party Advisory
http://secunia.com/advisories/28808 Third Party Advisory
http://secunia.com/advisories/28815 Third Party Advisory
http://secunia.com/advisories/28818 Third Party Advisory
http://secunia.com/advisories/28839 Third Party Advisory
http://secunia.com/advisories/28864 Third Party Advisory
http://secunia.com/advisories/28865 Third Party Advisory
http://secunia.com/advisories/28877 Third Party Advisory
http://secunia.com/advisories/28879 Third Party Advisory
http://secunia.com/advisories/28924 Third Party Advisory
http://secunia.com/advisories/28939 Third Party Advisory
http://secunia.com/advisories/28958 Third Party Advisory
http://secunia.com/advisories/29049 Third Party Advisory
http://secunia.com/advisories/29086 Third Party Advisory
http://secunia.com/advisories/29098 Third Party Advisory
http://secunia.com/advisories/29164 Third Party Advisory
http://secunia.com/advisories/29167 Third Party Advisory
http://secunia.com/advisories/29211 Third Party Advisory
http://secunia.com/advisories/29567 Third Party Advisory
http://secunia.com/advisories/30327 Third Party Advisory
http://secunia.com/advisories/30620 Third Party Advisory
http://secunia.com/advisories/31043 Third Party Advisory
http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html X_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0051 X_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0093 X_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093 X_refsource_confirm
http://www.mozilla.org/security/announce/2008/mfsa2008-03.html X_refsource_confirm
http://www.securityfocus.com/archive/1/487826/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/488002/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/488971/100/0/threaded Mailing List
http://www.securityfocus.com/bid/27683 Vdb Entry
http://www.securitytracker.com/id?1019327 Vdb Entry
http://www.vupen.com/english/advisories/2008/0453/references Vdb Entry
http://www.vupen.com/english/advisories/2008/0454/references Vdb Entry
http://www.vupen.com/english/advisories/2008/0627/references Vdb Entry
http://www.vupen.com/english/advisories/2008/1793/references Vdb Entry
http://www.vupen.com/english/advisories/2008/2091/references Vdb Entry
https://bugzilla.mozilla.org/buglist.cgi?bug_id=386695%2C393761%2C393762%2C399298%2C407289%2C372075%2C363597 X_refsource_confirm
https://issues.rpath.com/browse/RPL-1995 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9897 Signature
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html 2023-11-07
http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.445399 2023-11-07
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 2023-11-07
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 2023-11-07
http://www.debian.org/security/2008/dsa-1484 2023-11-07
http://www.debian.org/security/2008/dsa-1485 2023-11-07
http://www.debian.org/security/2008/dsa-1489 2023-11-07
http://www.debian.org/security/2008/dsa-1506 2023-11-07
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml 2023-11-07
http://www.mandriva.com/security/advisories?name=MDVSA-2008:048 2023-11-07
http://www.mandriva.com/security/advisories?name=MDVSA-2008:062 2023-11-07
http://www.redhat.com/support/errata/RHSA-2008-0103.html 2023-11-07
http://www.redhat.com/support/errata/RHSA-2008-0104.html 2023-11-07
http://www.redhat.com/support/errata/RHSA-2008-0105.html 2023-11-07
http://www.ubuntu.com/usn/usn-576-1 2023-11-07
http://www.ubuntu.com/usn/usn-582-1 2023-11-07
http://www.ubuntu.com/usn/usn-582-2 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html 2023-11-07
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html 2023-11-07
https://access.redhat.com/security/cve/CVE-2008-0415 2008-02-08
https://bugzilla.redhat.com/show_bug.cgi?id=431739 2008-02-08
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 2.0.0.11
Search vendor "Mozilla" for product "Firefox" and version " <= 2.0.0.11"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
<= 1.1.7
Search vendor "Mozilla" for product "Seamonkey" and version " <= 1.1.7"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 2.0.0.11
Search vendor "Mozilla" for product "Thunderbird" and version " <= 2.0.0.11"
-
Affected