Show filters
125 Total Results
Displaying 121-125 of 125
Sort by:
Attacker Value
Unknown
CVE-2007-4879
Disclosure Date: September 13, 2007 (last updated October 04, 2023)
Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.
0
Attacker Value
Unknown
CVE-2007-2867
Disclosure Date: June 01, 2007 (last updated October 04, 2023)
Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
0
Attacker Value
Unknown
CVE-2007-1362
Disclosure Date: June 01, 2007 (last updated October 04, 2023)
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
0
Attacker Value
Unknown
CVE-2007-1095
Disclosure Date: February 26, 2007 (last updated October 04, 2023)
Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.
0
Attacker Value
Unknown
CVE-2007-0981
Disclosure Date: February 16, 2007 (last updated October 04, 2023)
Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
0