CVE-2008-2806
Published Jul 7, 2008
Last updated 6 years ago
Overview
- Description
- Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 on Mac OS X allow remote attackers to bypass the Same Origin Policy and create arbitrary socket connections via a crafted Java applet, related to the Java Embedding Plugin (JEP) and Java LiveConnect.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3487FA64-BE04-42CA-861E-3DAC097D7D32" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F61EA4A1-1916-48A5-8196-E3CDEF3108F6" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5AA254D-D41E-464F-9E2A-A950F08C6946" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B05D2655-6641-42BE-9793-30005AC9D40D" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57E2C7E7-56C0-466C-BB08-5EB43922C4F9" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "462E135A-5616-46CC-A9C0-5A7A0526ACC6" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E391619-0967-43E1-8CBC-4D54F72A85C2" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0544D626-E269-4677-9B05-7DAB23BD103B" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C95F7B2C-80FC-4DF2-9680-F74634DCE3E6" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "863C140E-DC15-4A88-AB8A-8AEF9F4B8164" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23D609B2-F66C-40F1-B7D9-965189F875A5" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "327D8879-0B61-4681-886D-C53BE251E0ED" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59017F18-6C4E-4803-8A65-DB2A849C3197" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF006282-943B-4885-B523-6E575D664059" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26356AB4-1C06-4E16-BAC1-B6A41626A222" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CC11707-DF87-4046-964D-40CF22385A48" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F73F1171-E34D-4AC0-BF8B-3DB38AA13EF3" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0422C796-ECC4-42C1-9580-1CE22A096244" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D58B704B-F06E-44C1-BBD1-A090D1E6583A" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40270FBD-744A-49D9-9FFA-1DCD897210D7" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20E01097-F60A-4FB2-BA47-84A267EE87D6" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F65732F-317B-49A2-B9B0-FA1102B8B45C" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB430F19-069A-43FD-9097-586D4449D327" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76AD0439-3BFB-4AD1-8E2C-99D0B099FA8C" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E6D7528-E591-48A6-8165-BE42F8EBF6B6" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA710423-0075-44B8-9DCB-6380FA974486" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5521DA3-E6AF-4350-B971-10B4A1C9B1D1" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDD15752-A253-47B1-BCE0-B55B84B47C9F" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63AF48A9-C161-4603-82F0-5D2DE1EBA498" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "821E46E8-B084-4762-86F0-002CA288B522" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A084C258-7D78-4F6D-8E24-00BE9608EBFD" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "893FD2C8-C8EF-4ED3-9B7C-82D8DA9A1C38" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9FEA455-E605-4CE3-A951-760D59091C56" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1758117-4865-42A4-8110-2250924E21FF" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81AF4BFB-EC89-454B-89DF-FC8F6102E28C" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8013986B-DCAF-44A1-BA63-5BBA6762720F" } ], "operator": "OR" } ] } ]