CVE-2009-1839
12.06.2009, 21:30
Mozilla Firefox 3 before 3.0.11 associates an incorrect principal with a file: URL loaded through the location bar, which allows user-assisted remote attackers to bypass intended access restrictions and read files via a crafted HTML document, aka a "file-URL-to-file-URL scripting" attack.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 𝑥 ≤ 3.0.10 |
mozilla | firefox | 3.0 |
mozilla | firefox | 3.0:alpha |
mozilla | firefox | 3.0:beta2 |
mozilla | firefox | 3.0:beta5 |
mozilla | firefox | 3.0.1 |
mozilla | firefox | 3.0.2 |
mozilla | firefox | 3.0.3 |
mozilla | firefox | 3.0.4 |
mozilla | firefox | 3.0.5 |
mozilla | firefox | 3.0.6 |
mozilla | firefox | 3.0.7 |
mozilla | firefox | 3.0.8 |
mozilla | firefox | 3.0.9 |
mozilla | firefox | 3.0beta5:beta5 |
mozilla | firefox | 3.1:beta1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||||
xulrunner-1.9 |
| ||||||||||
xulrunner-1.9.1 |
|
Common Weakness Enumeration
References