Vulnerabilities > Mozilla

DATE CVE VULNERABILITY TITLE RISK
2006-11-08 CVE-2006-5462 Unspecified vulnerability in Mozilla products
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates.
network
low complexity
mozilla
6.4
2006-10-31 CVE-2006-5633 Denial of Service vulnerability in Mozilla Firefox Range Script Object
Firefox 1.5.0.7 and 2.0, and Seamonkey 1.1b, allows remote attackers to cause a denial of service (crash) by creating a range object using createRange, calling selectNode on a DocType node (DOCUMENT_TYPE_NODE), then calling createContextualFragment on the range, which triggers a null dereference.
network
low complexity
mozilla
5.0
2006-10-23 CVE-2006-5455 Input Validation and Information disclosure vulnerability in Mozilla Bugzilla
Cross-site request forgery (CSRF) vulnerability in editversions.cgi in Bugzilla before 2.22.1 and 2.23.x before 2.23.3 allows user-assisted remote attackers to create, modify, or delete arbitrary bug reports via a crafted URL.
network
high complexity
mozilla
2.6
2006-10-23 CVE-2006-5454 Input Validation and Information disclosure vulnerability in Mozilla Bugzilla
Bugzilla 2.18.x before 2.18.6, 2.20.x before 2.20.3, 2.22.x before 2.22.1, and 2.23.x before 2.23.3 allow remote attackers to obtain (1) the description of arbitrary attachments by viewing the attachment in "diff" mode in attachment.cgi, and (2) the deadline field by viewing the XML format of the bug in show_bug.cgi.
network
low complexity
mozilla
5.0
2006-10-23 CVE-2006-5453 Input Validation and Information disclosure vulnerability in Mozilla Bugzilla
Multiple cross-site scripting (XSS) vulnerabilities in Bugzilla 2.18.x before 2.18.6, 2.20.x before 2.20.3, 2.22.x before 2.22.1, and 2.23.x before 2.23.3 allow remote authenticated users to inject arbitrary web script or HTML via (1) page headers using the H1, H2, and H3 HTML tags in global/header.html.tmpl, (2) description fields of certain items in various edit cgi scripts, and (3) the id parameter in showdependencygraph.cgi.
network
mozilla
3.5
2006-09-15 CVE-2006-4571 Remote vulnerability in Mozilla Seamonkey and Thunderbird
Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.
network
low complexity
mozilla
critical
10.0
2006-09-15 CVE-2006-4570 Remote vulnerability in Mozilla Seamonkey and Thunderbird
Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with "Load Images" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.
network
high complexity
mozilla
2.6
2006-09-15 CVE-2006-4569 Remote vulnerability in Mozilla Firefox/Thunderbird/Seamonkey
The popup blocker in Mozilla Firefox before 1.5.0.7 opens the "blocked popups" display in the context of the Location bar instead of the subframe from which the popup originated, which might make it easier for remote user-assisted attackers to conduct cross-site scripting (XSS) attacks.
network
high complexity
mozilla
2.6
2006-09-15 CVE-2006-4568 Cross-Site Scripting vulnerability in Mozilla Firefox and Seamonkey
Mozilla Firefox before 1.5.0.7 and SeaMonkey before 1.0.5 allows remote attackers to bypass the security model and inject content into the sub-frame of another site via targetWindow.frames[n].document.open(), which facilitates spoofing and other attacks.
network
mozilla CWE-79
4.3
2006-09-15 CVE-2006-4567 Remote vulnerability in Mozilla Firefox and Thunderbird
Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.
network
high complexity
mozilla
2.6