Vulnerabilities > Mozilla > Seamonkey > 1.1.6

DATE CVE VULNERABILITY TITLE RISK
2007-12-28 CVE-2007-6589 Cross-Site Scripting vulnerability in Mozilla Firefox and Seamonkey
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.
network
mozilla CWE-79
4.3
2007-11-14 CVE-2007-5947 Cross-Site Scripting vulnerability in Mozilla Firefox and Seamonkey
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
network
mozilla CWE-79
4.3
2007-09-13 CVE-2007-4879 Remote vulnerability in Mozilla Thunderbird/Seamonkey/Firefox 2.0.0.12
Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.
network
low complexity
mozilla
5.0
2006-12-20 CVE-2006-6497 Remote vulnerability in Mozilla Firefox, Seamonkey and Thunderbird
Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown attack vectors.
network
mozilla
6.8