Show filters
305 Total Results
Displaying 301-305 of 305
Sort by:
Attacker Value
Unknown
CVE-2006-1734
Disclosure Date: April 14, 2006 (last updated October 04, 2023)
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the "clone parent" internal function.
0
Attacker Value
Unknown
CVE-2006-1730
Disclosure Date: April 14, 2006 (last updated October 04, 2023)
Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via a large number in the CSS letter-spacing property that leads to a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2006-1736
Disclosure Date: April 14, 2006 (last updated October 04, 2023)
Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to trick users into downloading and saving an executable file via an image that is overlaid by a transparent image link that points to the executable, which causes the executable to be saved when the user clicks the "Save image as..." option. NOTE: this attack is made easier due to a GUI truncation issue that prevents the user from seeing the malicious extension when there is extra whitespace in the filename.
0
Attacker Value
Unknown
CVE-2006-0296
Disclosure Date: February 02, 2006 (last updated February 22, 2025)
The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.
0
Attacker Value
Unknown
CVE-2006-0294
Disclosure Date: February 02, 2006 (last updated February 22, 2025)
Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 allow remote attackers to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to operate on freed memory.
0