Vulnerabilities > Mozilla > Firefox > 3.0.5

DATE CVE VULNERABILITY TITLE RISK
2013-08-07 CVE-2013-1708 Denial of Service vulnerability in Mozilla Firefox/SeaMonkey
Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function.
network
mozilla
4.3
2013-08-07 CVE-2013-1705 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mozilla Firefox and Seamonkey
Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
network
low complexity
mozilla CWE-119
critical
10.0
2013-08-07 CVE-2013-1704 Resource Management Errors vulnerability in Mozilla Firefox and Seamonkey
Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
network
mozilla CWE-399
critical
9.3
2013-08-07 CVE-2013-1702 Memory Corruption vulnerability in Mozilla Firefox/Thunderbird/Seamonkey
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
network
low complexity
mozilla
critical
10.0
2013-06-26 CVE-2013-1700 Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox
The Mozilla Maintenance Service in Mozilla Firefox before 22.0 on Windows does not properly handle inability to launch the Mozilla Updater executable file, which allows local users to gain privileges via vectors involving placement of a Trojan horse executable file at an arbitrary location.
local
low complexity
mozilla microsoft CWE-264
7.2
2013-06-26 CVE-2013-1699 Cryptographic Issues vulnerability in Mozilla Firefox
The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .com, .name, and .net top-level domains, which allows remote attackers to spoof the address bar via unspecified homograph characters.
network
low complexity
mozilla CWE-310
5.0
2013-06-26 CVE-2013-1698 Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox
The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.
network
mozilla CWE-264
4.3
2013-06-26 CVE-2013-1696 Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox
Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses.
network
high complexity
mozilla CWE-264
4.0
2013-06-26 CVE-2013-1695 Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox
Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element.
network
low complexity
mozilla CWE-264
5.0
2013-06-26 CVE-2013-1690 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
8.8