4.3
CVSSv2

CVE-2008-1241

Published: 27/03/2008 Updated: 11/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

GUI overlay vulnerability in Mozilla Firefox prior to 2.0.0.13 and SeaMonkey prior to 1.1.9 allows remote malicious users to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla seamonkey

mozilla firefox

Vendor Advisories

Alexey Proskuryakov, Yosuke Hasegawa and Simon Montagu discovered flaws in Firefox’s character encoding handling If a user were tricked into opening a malicious web page, an attacker could perform cross-site scripting attacks (CVE-2008-0416) ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-4879 Peter Brodersen and Alexander Klink discovered that the autoselection of SSL client certificates could lead to users being tracke ...
Several remote vulnerabilities have been discovered in the Iceape internet suite, an unbranded version of the Seamonkey Internet Suite The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-4879 Peter Brodersen and Alexander Klink discovered that the autoselection of SSL client certificates could lead ...
Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-4879 Peter Brodersen and Alexander Klink discovered that the autoselection of SSL client certificates could lead to users ...
Mozilla Foundation Security Advisory 2008-19 XUL popup spoofing variant (cross-tab popups) Announced March 25, 2008 Reporter Chris Thomas Impact High Products Firefox, SeaMonkey Fixed in ...

References

CWE-59http://www.mozilla.org/security/announce/2008/mfsa2008-19.htmlhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128http://www.debian.org/security/2008/dsa-1532http://rhn.redhat.com/errata/RHSA-2008-0208.htmlhttp://secunia.com/advisories/29391http://secunia.com/advisories/29560http://www.debian.org/security/2008/dsa-1534http://www.debian.org/security/2008/dsa-1535http://www.mandriva.com/security/advisories?name=MDVSA-2008:080http://www.redhat.com/support/errata/RHSA-2008-0207.htmlhttp://www.ubuntu.com/usn/usn-592-1http://www.us-cert.gov/cas/techalerts/TA08-087A.htmlhttp://www.securityfocus.com/bid/28448http://www.securitytracker.com/id?1019700http://secunia.com/advisories/29550http://secunia.com/advisories/29539http://secunia.com/advisories/29558http://secunia.com/advisories/29616http://secunia.com/advisories/29526http://secunia.com/advisories/29541http://secunia.com/advisories/29547http://www.redhat.com/support/errata/RHSA-2008-0209.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.htmlhttp://secunia.com/advisories/29645http://secunia.com/advisories/29607http://secunia.com/advisories/30327http://www.gentoo.org/security/en/glsa/glsa-200805-18.xmlhttp://secunia.com/advisories/30620http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1http://www.vupen.com/english/advisories/2008/0998/referenceshttp://www.vupen.com/english/advisories/2008/1793/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41454https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11163http://www.securityfocus.com/archive/1/490196/100/0/threadedhttps://usn.ubuntu.com/592-1/https://nvd.nist.gov