CVE-2008-4059

N/A Unknown
Published: September 24, 2008 Modified: April 23, 2026
View on NVD

Description

The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31984
Source: secalert@redhat.com
http://secunia.com/advisories/31985
Source: secalert@redhat.com
http://secunia.com/advisories/32007
Source: secalert@redhat.com
http://secunia.com/advisories/32010
Source: secalert@redhat.com
http://secunia.com/advisories/32012
Source: secalert@redhat.com
http://secunia.com/advisories/32025
Source: secalert@redhat.com
http://secunia.com/advisories/32042
Source: secalert@redhat.com
http://secunia.com/advisories/32044
Source: secalert@redhat.com
http://secunia.com/advisories/32082
Source: secalert@redhat.com
http://secunia.com/advisories/32092
Source: secalert@redhat.com
http://secunia.com/advisories/32144
Source: secalert@redhat.com
http://secunia.com/advisories/32185
Source: secalert@redhat.com
http://secunia.com/advisories/32196
Source: secalert@redhat.com
http://secunia.com/advisories/32845
Source: secalert@redhat.com
http://secunia.com/advisories/33433
Source: secalert@redhat.com
http://secunia.com/advisories/33434
Source: secalert@redhat.com
http://secunia.com/advisories/34501
Source: secalert@redhat.com
http://www.securityfocus.com/bid/31346
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-645-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-645-2
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-647-1
Source: secalert@redhat.com
http://download.novell.com/Download?buildid=WZXONb-tqBw~
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31984
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31985
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32007
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32010
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32012
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32025
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32042
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32044
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32082
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32092
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32144
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32185
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32196
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32845
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33433
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33434
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34501
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1649
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1669
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1696
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1697
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2008/mfsa2008-41.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0882.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0908.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31346
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1020915
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-645-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-645-2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-647-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2661
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/0977
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=419848
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/45352
Source: af854a3a-2127-422b-91ae-364da2661108

88 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla