CVE-2008-5503

N/A Unknown
Published: December 17, 2008 Modified: April 23, 2026
View on NVD

Description

The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/33184
Source: secalert@redhat.com
http://secunia.com/advisories/33189
Source: secalert@redhat.com
http://secunia.com/advisories/33204
Source: secalert@redhat.com
http://secunia.com/advisories/33205
Source: secalert@redhat.com
http://secunia.com/advisories/33231
Source: secalert@redhat.com
http://secunia.com/advisories/33232
Source: secalert@redhat.com
http://secunia.com/advisories/33408
Source: secalert@redhat.com
http://secunia.com/advisories/33415
Source: secalert@redhat.com
http://secunia.com/advisories/33421
Source: secalert@redhat.com
http://secunia.com/advisories/33433
Source: secalert@redhat.com
http://secunia.com/advisories/33434
Source: secalert@redhat.com
http://secunia.com/advisories/33523
Source: secalert@redhat.com
http://secunia.com/advisories/33547
Source: secalert@redhat.com
http://secunia.com/advisories/34501
Source: secalert@redhat.com
http://secunia.com/advisories/35080
Source: secalert@redhat.com
http://www.securityfocus.com/bid/32882
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-690-2
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-701-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-701-2
Source: secalert@redhat.com
https://usn.ubuntu.com/690-3/
Source: secalert@redhat.com
http://secunia.com/advisories/33184
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33189
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33204
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33205
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33231
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33232
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33408
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33415
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33421
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33433
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33434
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33523
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33547
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34501
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35080
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1696
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1697
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1704
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1707
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2008/mfsa2008-61.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-1037.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-0002.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/32882
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1021424
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-690-2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-701-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-701-2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/0977
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=379959
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/47409
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/690-3/
Source: af854a3a-2127-422b-91ae-364da2661108

72 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.2%
79th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mozilla