Description
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."
Published: 2008-03-27
Score: 4.3 Medium
EPSS: 9.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1532-1 New xulrunner packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1534-1 New iceape packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1534-2 New iceape packages fix regression
Debian DSA Debian DSA DSA-1535-1 New iceweasel packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1574-1 New icedove packages fix several vulnerabilities
EUVD EUVD EUVD-2008-1242 Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."
Ubuntu USN Ubuntu USN USN-592-1 Firefox vulnerabilities
Ubuntu USN Ubuntu USN USN-605-1 Thunderbird vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2008-0208.html cve-icon cve-icon
http://secunia.com/advisories/29391 cve-icon cve-icon
http://secunia.com/advisories/29526 cve-icon cve-icon
http://secunia.com/advisories/29539 cve-icon cve-icon
http://secunia.com/advisories/29541 cve-icon cve-icon
http://secunia.com/advisories/29547 cve-icon cve-icon
http://secunia.com/advisories/29548 cve-icon cve-icon
http://secunia.com/advisories/29550 cve-icon cve-icon
http://secunia.com/advisories/29558 cve-icon cve-icon
http://secunia.com/advisories/29560 cve-icon cve-icon
http://secunia.com/advisories/29607 cve-icon cve-icon
http://secunia.com/advisories/29616 cve-icon cve-icon
http://secunia.com/advisories/29645 cve-icon cve-icon
http://secunia.com/advisories/30016 cve-icon cve-icon
http://secunia.com/advisories/30094 cve-icon cve-icon
http://secunia.com/advisories/30105 cve-icon cve-icon
http://secunia.com/advisories/30192 cve-icon cve-icon
http://secunia.com/advisories/30327 cve-icon cve-icon
http://secunia.com/advisories/30370 cve-icon cve-icon
http://secunia.com/advisories/30620 cve-icon cve-icon
http://secunia.com/advisories/31043 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 cve-icon cve-icon
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1532 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1534 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1535 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1574 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml cve-icon cve-icon
http://www.kb.cert.org/vuls/id/466521 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:080 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 cve-icon cve-icon
http://www.mozilla.org/security/announce/2008/mfsa2008-14.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0207.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0209.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/490196/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/28448 cve-icon cve-icon
http://www.securitytracker.com/id?1019694 cve-icon cve-icon
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-592-1 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-605-1 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA08-087A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0998/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0999/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1793/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2091/references cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/41455 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-1234 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9551 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-1234 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html cve-icon cve-icon
History

No history.

Subscriptions

Mozilla Firefox Seamonkey Thunderbird
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T08:17:34.080Z

Reserved: 2008-03-10T00:00:00.000Z

Link: CVE-2008-1234

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-03-27T10:44:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-1234

cve-icon Redhat

Severity : Moderate

Publid Date: 2008-03-25T00:00:00Z

Links: CVE-2008-1234 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses