Vulnerabilities > Mozilla > Firefox > 1.5.8

DATE CVE VULNERABILITY TITLE RISK
2007-07-10 CVE-2007-3656 Information Exposure vulnerability in Mozilla Firefox
Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs.
network
mozilla CWE-200
6.8
2007-06-20 CVE-2007-3285 Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox
Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.
6.8
2007-06-06 CVE-2007-3089 Information Disclosure vulnerability in Mozilla Firefox About:Blank IFrame Cross Domain
Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the "promiscuous IFRAME access bug," a related issue to CVE-2006-4568.
network
mozilla
4.3
2007-06-06 CVE-2007-3073 Directory Traversal vulnerability in Firefox
Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI.
network
low complexity
apple unix mozilla
7.8
2007-06-01 CVE-2007-2867 Buffer Errors vulnerability in Mozilla Firefox, Seamonkey and Thunderbird
Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
network
mozilla CWE-119
critical
9.3
2007-06-01 CVE-2007-1362 Improper Input Validation vulnerability in Mozilla Firefox and Seamonkey
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
network
mozilla CWE-20
4.3
2007-04-26 CVE-2007-2292 Improper Input Validation vulnerability in multiple products
CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
4.3
2007-02-26 CVE-2007-0779 Remote vulnerability in Mozilla Thunderbird/SeaMonkey/Firefox
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
network
low complexity
mozilla
6.4
2007-02-26 CVE-2007-0776 Buffer Errors vulnerability in Mozilla Firefox, Seamonkey and Thunderbird
Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
network
mozilla CWE-119
critical
9.3
2007-02-26 CVE-2007-1095 Unspecified vulnerability in Mozilla Firefox and Seamonkey
Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.
network
mozilla
6.8