Show filters
120 Total Results
Displaying 101-110 of 120
Sort by:
Attacker Value
Unknown

CVE-2007-1282

Disclosure Date: March 06, 2007 (last updated October 04, 2023)
Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.
0
Attacker Value
Unknown

CVE-2007-0008

Disclosure Date: February 26, 2007 (last updated October 04, 2023)
Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the "Master Secret", which results in a heap-based overflow.
0
Attacker Value
Unknown

CVE-2006-6502

Disclosure Date: December 20, 2006 (last updated October 04, 2023)
Use-after-free vulnerability in the LiveConnect bridge code for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) via unknown vectors.
0
Attacker Value
Unknown

CVE-2006-6498

Disclosure Date: December 20, 2006 (last updated October 04, 2023)
Multiple unspecified vulnerabilities in the JavaScript engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, SeaMonkey before 1.0.7, and Mozilla 1.7 and probably earlier on Solaris, allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown impact and attack vectors.
0
Attacker Value
Unknown

CVE-2006-2779

Disclosure Date: June 02, 2006 (last updated October 04, 2023)
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
0
Attacker Value
Unknown

CVE-2006-2775

Disclosure Date: June 02, 2006 (last updated October 04, 2023)
Mozilla Firefox and Thunderbird before 1.5.0.4 associates XUL attributes with the wrong URL under certain unspecified circumstances, which might allow remote attackers to bypass restrictions by causing a persisted string to be associated with the wrong URL.
0
Attacker Value
Unknown

CVE-2006-2776

Disclosure Date: June 02, 2006 (last updated October 04, 2023)
Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
0
Attacker Value
Unknown

CVE-2006-0884

Disclosure Date: February 24, 2006 (last updated February 22, 2025)
The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
0
Attacker Value
Unknown

CVE-2005-4809

Disclosure Date: December 31, 2005 (last updated February 22, 2025)
Mozilla Firefox 1.0.1 and possibly other versions, including Mozilla and Thunderbird, allows remote attackers to spoof the URL in the Status Bar via an A HREF tag that contains a TABLE tag that contains another A tag.
0
Attacker Value
Unknown

CVE-2005-2261

Disclosure Date: July 13, 2005 (last updated February 22, 2025)
Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.
0