Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mozilla firefox 1.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-3731
Mozilla Firefox 1.5.0.4 and previous versions allows remote user-assisted malicious users to cause a denial of service (crash) via a form with a multipart/form-data encoding and a user-uploaded file. NOTE: a third party has claimed that this issue might be related to the LiveHTTP...
Mozilla Firefox 1.5
Mozilla Firefox 1.5.0.3
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
NA
CVE-2006-0292
The Javascript interpreter (jsinterp.c) in Mozilla and Firefox prior to 1.5.1 does not properly dereference objects, which allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via unknown attack vectors related to garbage collection.
Mozilla Firefox 0.8
Mozilla Mozilla 1.5
Mozilla Firefox 1.0.2
Mozilla Firefox 1.5
Mozilla Firefox 0.9.1
Mozilla Firefox 1.0.4
Mozilla Firefox 1.0.7
Mozilla Firefox 0.10.1
Mozilla Firefox 0.9
Mozilla Mozilla 1.4.1
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Mozilla 1.4
Mozilla Firefox 1.0.6
Mozilla Firefox 1.0.3
Mozilla Firefox 0.9.3
Mozilla Firefox 0.9.2
Mozilla Firefox 0.10
Mozilla Firefox 1.0.5
NA
CVE-2006-0294
Mozilla Firefox prior to 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey prior to 1.0 allow remote malicious users to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to operate on freed...
Mozilla Firefox 0.8
Mozilla Firefox 1.0.2
Mozilla Seamonkey 1.0
Mozilla Firefox 1.5
Mozilla Firefox 0.9.1
Mozilla Firefox 1.0.4
Mozilla Firefox 1.0.7
Mozilla Firefox 0.10.1
Mozilla Firefox 0.9
Mozilla Firefox 1.0
Mozilla Thunderbird 1.5
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.6
Mozilla Firefox 1.0.3
Mozilla Firefox 0.9.3
Mozilla Firefox 0.9.2
Mozilla Firefox 0.10
Mozilla Firefox 1.0.5
NA
CVE-2006-3113
Mozilla Firefox 1.5 prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a wa...
Mozilla Seamonkey 1.0.1
Mozilla Firefox 1.5.0.3
Mozilla Seamonkey 1.0
Mozilla Firefox 1.5
Mozilla Seamonkey 1.0.2
Mozilla Thunderbird 1.5
Mozilla Thunderbird 1.5.0.2
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
Mozilla Thunderbird 1.5.0.4
NA
CVE-2006-3802
Mozilla Firefox prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 allows remote malicious users to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Mozilla Seamonkey 1.0.1
Mozilla Firefox 1.5.0.3
Mozilla Seamonkey 1.0
Mozilla Firefox 1.5
Mozilla Seamonkey 1.0.2
Mozilla Thunderbird 1.5
Mozilla Thunderbird 1.5.0.2
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
Mozilla Thunderbird 1.5.0.4
NA
CVE-2006-3803
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 might allow remote malicious users to execute arbitrary code by causing the garbage collector to delete a temporary variable whi...
Mozilla Seamonkey 1.0.1
Mozilla Firefox 1.5.0.3
Mozilla Seamonkey 1.0
Mozilla Firefox 1.5
Mozilla Seamonkey 1.0.2
Mozilla Thunderbird 1.5
Mozilla Thunderbird 1.5.0.2
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
Mozilla Thunderbird 1.5.0.4
NA
CVE-2006-3805
The Javascript engine in Mozilla Firefox prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 might allow remote malicious users to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still bei...
Mozilla Seamonkey 1.0.1
Mozilla Firefox 1.5.0.3
Mozilla Seamonkey 1.0
Mozilla Firefox 1.5
Mozilla Seamonkey 1.0.2
Mozilla Thunderbird 1.5
Mozilla Thunderbird 1.5.0.2
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
Mozilla Thunderbird 1.5.0.4
NA
CVE-2006-3806
Multiple integer overflows in the Javascript engine in Mozilla Firefox prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 might allow remote malicious users to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Ob...
Mozilla Seamonkey 1.0.1
Mozilla Firefox 1.5.0.3
Mozilla Seamonkey 1.0
Mozilla Firefox 1.5
Mozilla Seamonkey 1.0.2
Mozilla Thunderbird 1.5
Mozilla Thunderbird 1.5.0.2
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
Mozilla Thunderbird 1.5.0.4
NA
CVE-2006-3807
Mozilla Firefox prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 allows remote malicious users to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named Java...
Mozilla Seamonkey 1.0.1
Mozilla Firefox 1.5.0.3
Mozilla Seamonkey 1.0
Mozilla Firefox 1.5
Mozilla Seamonkey 1.0.2
Mozilla Thunderbird 1.5
Mozilla Thunderbird 1.5.0.2
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
Mozilla Thunderbird 1.5.0.4
NA
CVE-2006-3809
Mozilla Firefox prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Mozilla Seamonkey 1.0.1
Mozilla Firefox 1.5.0.3
Mozilla Seamonkey 1.0
Mozilla Firefox 1.5
Mozilla Seamonkey 1.0.2
Mozilla Thunderbird 1.5
Mozilla Thunderbird 1.5.0.2
Mozilla Firefox 1.5.0.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
Mozilla Thunderbird 1.5.0.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »