Vulnerabilities > Mozilla > Firefox > 3.5.1

DATE CVE VULNERABILITY TITLE RISK
2009-08-04 CVE-2009-2662 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mozilla Firefox
The browser engine in Mozilla Firefox 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the TraceRecorder::snapshot function in js/src/jstracer.cpp, and unspecified other vectors.
network
low complexity
mozilla CWE-119
critical
10.0
2009-08-04 CVE-2009-2470 Improper Input Validation vulnerability in Mozilla Firefox
Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.
network
low complexity
mozilla CWE-20
5.0
2009-08-03 CVE-2009-2654 Improper Input Validation vulnerability in Mozilla Firefox
Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
network
mozilla CWE-20
5.8
2009-07-16 CVE-2009-2479 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mozilla Firefox
Mozilla Firefox 3.0.x, 3.5, and 3.5.1 on Windows allows remote attackers to cause a denial of service (uncaught exception and application crash) via a long Unicode string argument to the write method.
network
low complexity
mozilla CWE-119
7.8
2009-07-01 CVE-2009-0689 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
6.8
2009-01-20 CVE-2008-5913 Information Disclosure vulnerability in Multiple Browser JavaScript Engine 'Math.Random()' Cross Domain
The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
network
mozilla
4.9