Show filters
265 Total Results
Displaying 261-265 of 265
Sort by:
Attacker Value
Unknown

CVE-2006-1734

Disclosure Date: April 14, 2006 (last updated October 04, 2023)
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the "clone parent" internal function.
0
Attacker Value
Unknown

CVE-2006-1730

Disclosure Date: April 14, 2006 (last updated October 04, 2023)
Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via a large number in the CSS letter-spacing property that leads to a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2006-1736

Disclosure Date: April 14, 2006 (last updated October 04, 2023)
Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to trick users into downloading and saving an executable file via an image that is overlaid by a transparent image link that points to the executable, which causes the executable to be saved when the user clicks the "Save image as..." option. NOTE: this attack is made easier due to a GUI truncation issue that prevents the user from seeing the malicious extension when there is extra whitespace in the filename.
0
Attacker Value
Unknown

CVE-2006-0294

Disclosure Date: February 02, 2006 (last updated February 22, 2025)
Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 allow remote attackers to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to operate on freed memory.
0
Attacker Value
Unknown

CVE-2005-2261

Disclosure Date: July 13, 2005 (last updated February 22, 2025)
Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.
0