Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T07:46:54.336Z
Reserved: 2008-01-23T00:00:00
Link: CVE-2008-0418

No data.

Status : Modified
Published: 2008-02-08T22:00:00.000
Modified: 2024-11-21T00:42:02.990
Link: CVE-2008-0418
