Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netscape navigator 7.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-1160
Netscape 7.x to 7.2, and possibly other versions, allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web sit...
Netscape Navigator 7.0
Netscape Navigator 7.0.2
Netscape Navigator 7.2
Netscape Navigator 7.1
5.1
CVSSv2
CVE-2006-1942
Mozilla Firefox 1.5.0.2 and possibly other versions prior to 1.5.0.4, Netscape 8.1, 8.0.4, and 7.2, and K-Meleon 0.9.13 allows user-assisted remote malicious users to open local files via a web page with an IMG element containing a SRC attribute with a non-image file:// URL, then...
K-meleon Project K-meleon 0.9.13
Mozilla Firefox 1.5.0.2
Netscape Navigator 7.2
Netscape Navigator 8.0.40
Netscape Navigator 8.1
2.6
CVSSv2
CVE-2004-1753
The Apple Java plugin, as used in Netscape 7.1 and 7.2, Mozilla 1.7.2, and Firefox 0.9.3 on MacOS X 10.3.5, when tabbed browsing is enabled, does not properly handle SetWindow(NULL) calls, which allows Java applets from one tab to draw to other tabs and facilitates phishing attac...
Netscape Navigator 7.2
Mozilla Mozilla 1.7.2
Netscape Navigator 7.1
Mozilla Firefox 0.9.3
4.3
CVSSv2
CVE-2006-2613
Mozilla Suite 1.7.13, Mozilla Firefox 1.5.0.3 and possibly other versions before prior to 1.8.0, and Netscape 7.2 and 8.1, and possibly other versions and products, allows remote user-assisted malicious users to obtain information such as the installation path by causing exceptio...
Mozilla Firefox 1.5.0.1
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.3
Netscape Navigator 8.1
Mozilla Mozilla Suite 1.7.13
Netscape Navigator 7.2
5
CVSSv2
CVE-2005-0989
The find_replen function in jsstr.c in the Javascript engine for Mozilla Suite 1.7.6, Firefox 1.0.1 and 1.0.2, and Netscape 7.2 allows remote malicious users to read portions of heap memory in a Javascript string via the lambda replace method.
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.2
Mozilla Mozilla 1.7.6
Netscape Navigator 7.2
1 EDB exploit
5
CVSSv2
CVE-2005-4134
Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon prior to 0.9.12 allows remote malicious users to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently...
Netscape Navigator 7.2
K-meleon Project K-meleon
K-meleon Project K-meleon 0.7
K-meleon Project K-meleon 0.7 Service Pack 1
Mozilla Firefox
Mozilla Mozilla Suite
K-meleon Project K-meleon 0.8
K-meleon Project K-meleon 0.8.1
Netscape Navigator
K-meleon Project K-meleon 0.8.2
Netscape Navigator 7.1
1 EDB exploit
10
CVSSv2
CVE-2004-0904
Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla prior to 1.7.3, and Thunderbird prior to 0.8 allow remote malicious users to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.
Mozilla Firefox 0.8
Mozilla Firefox 0.9
Mozilla Mozilla 1.7.2
Mozilla Mozilla 1.7
Netscape Navigator 7.0.2
Netscape Navigator 7.1
Mozilla Mozilla 1.7.1
Mozilla Thunderbird 0.7.3
Netscape Navigator 7.0
Mozilla Firefox 0.9.1
Mozilla Firefox 0.9.2
Mozilla Thunderbird 0.6
Mozilla Thunderbird 0.7
Netscape Navigator 7.2
Conectiva Linux 10.0
Mozilla Firefox 0.9.3
Mozilla Thunderbird 0.7.1
Mozilla Thunderbird 0.7.2
Conectiva Linux 9.0
Redhat Enterprise Linux 2.1
Redhat Linux 7.3
Redhat Enterprise Linux Desktop 3.0
4.6
CVSSv2
CVE-2004-0905
Mozilla Firefox before the Preview Release, Mozilla prior to 1.7.3, and Thunderbird prior to 0.8 allows remote malicious users to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in anoth...
Mozilla Firefox 0.9
Mozilla Firefox 0.9.1
Mozilla Mozilla 1.0
Mozilla Mozilla 1.1
Mozilla Mozilla 1.3
Mozilla Mozilla 1.3.1
Mozilla Mozilla 1.6
Mozilla Mozilla 1.7
Conectiva Linux 10.0
Conectiva Linux 9.0
Mozilla Firefox 0.8
Mozilla Mozilla 1.0.2
Mozilla Mozilla 1.2
Mozilla Mozilla 1.4
Mozilla Mozilla 1.5
Netscape Navigator 7.1
Netscape Navigator 7.2
Mozilla Firefox 0.9.2
Mozilla Firefox 0.9.3
Mozilla Mozilla 1.4.1
Mozilla Mozilla 1.7.1
Mozilla Mozilla 1.7.2
7.5
CVSSv2
CVE-2005-1156
Firefox prior to 1.0.3, Mozilla Suite prior to 1.7.7, and Netscape 7.2 allows remote malicious users to execute arbitrary script and code via a new search plugin using sidebar.addSearchEngine, aka "Firesearching 1."
Mozilla Firefox 0.10
Mozilla Firefox 0.10.1
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Firefox 0.9.3
Mozilla Firefox 0.9
Mozilla Mozilla 1.4
Mozilla Mozilla 1.5
Mozilla Mozilla 1.7
Mozilla Mozilla 1.7.1
Mozilla Firefox 0.8
Mozilla Firefox 1.0.2
Mozilla Mozilla 1.3
Mozilla Mozilla 1.6
Mozilla Mozilla 1.7.5
Mozilla Mozilla 1.7.6
Mozilla Firefox 0.9.1
Mozilla Firefox 0.9.2
Mozilla Mozilla 1.4.1
Mozilla Mozilla 1.5.1
Mozilla Mozilla 1.7.2
Mozilla Mozilla 1.7.3
7.5
CVSSv2
CVE-2005-1157
Firefox prior to 1.0.3, Mozilla Suite prior to 1.7.7, and Netscape 7.2 allows remote malicious users to replace existing search plugins with malicious ones using sidebar.addSearchEngine and the same filename as the target engine, which may not be displayed in the GUI, which could...
Mozilla Firefox 0.9
Mozilla Firefox 0.9.1
Mozilla Mozilla 1.4
Mozilla Mozilla 1.4.1
Mozilla Mozilla 1.6
Mozilla Mozilla 1.7.6
Mozilla Mozilla 1.7
Mozilla Firefox 0.10
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Mozilla 1.5.1
Mozilla Mozilla 1.5
Mozilla Mozilla 1.7.1
Mozilla Mozilla 1.7.2
Netscape Navigator 7.2
Mozilla Firefox 0.10.1
Mozilla Firefox 0.8
Mozilla Firefox 1.0.2
Mozilla Mozilla 1.3
Mozilla Mozilla 1.7.3
Mozilla Mozilla 1.7.5
Mozilla Firefox 0.9.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started