Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2008-0016
Description:Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.
Test IDs: 1.3.6.1.4.1.25623.1.0.63143   1.3.6.1.4.1.25623.1.0.63144   1.3.6.1.4.1.25623.1.0.61770   1.3.6.1.4.1.25623.1.0.61907  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2008-0016
BugTraq ID: 31397
http://www.securityfocus.com/bid/31397
Debian Security Information: DSA-1649 (Google Search)
http://www.debian.org/security/2008/dsa-1649
Debian Security Information: DSA-1669 (Google Search)
http://www.debian.org/security/2008/dsa-1669
Debian Security Information: DSA-1696 (Google Search)
http://www.debian.org/security/2009/dsa-1696
Debian Security Information: DSA-1697 (Google Search)
http://www.debian.org/security/2009/dsa-1697
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11579
RedHat Security Advisories: RHSA-2008:0882
http://www.redhat.com/support/errata/RHSA-2008-0882.html
RedHat Security Advisories: RHSA-2008:0908
http://www.redhat.com/support/errata/RHSA-2008-0908.html
http://www.securitytracker.com/id?1020913
http://secunia.com/advisories/31984
http://secunia.com/advisories/31985
http://secunia.com/advisories/32010
http://secunia.com/advisories/32012
http://secunia.com/advisories/32042
http://secunia.com/advisories/32044
http://secunia.com/advisories/32082
http://secunia.com/advisories/32092
http://secunia.com/advisories/32144
http://secunia.com/advisories/32185
http://secunia.com/advisories/32196
http://secunia.com/advisories/32845
http://secunia.com/advisories/33433
http://secunia.com/advisories/33434
http://secunia.com/advisories/34501
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
SuSE Security Announcement: SUSE-SA:2008:050 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
http://www.ubuntu.com/usn/usn-645-1
http://www.ubuntu.com/usn/usn-645-2
http://www.vupen.com/english/advisories/2008/2661
http://www.vupen.com/english/advisories/2009/0977




© 1998-2025 E-Soft Inc. All rights reserved.