Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mozilla mozilla 1.7.6 vulnerabilities and exploits
(subscribe to this query)
2.6
CVSSv2
CVE-2005-0587
Firefox prior to 1.0.1 and Mozilla prior to 1.7.6 allows remote malicious web sites to overwrite arbitrary files by tricking the user into downloading a .LNK (link) file twice, which overwrites the file that was referenced in the first .LNK file.
Mozilla Mozilla
Mozilla Firefox
2.6
CVSSv2
CVE-2005-0593
Firefox prior to 1.0.1 and Mozilla prior to 1.7.6 allows remote malicious users to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the loc...
Mozilla Firefox 0.10
Mozilla Firefox 0.9
Mozilla Firefox 1.0
Mozilla Mozilla 1.5
Mozilla Mozilla 1.7.3
Mozilla Mozilla 1.7.5
Mozilla Firefox 0.9.2
Mozilla Firefox 0.9.3
Mozilla Mozilla 1.5.1
Mozilla Mozilla 1.7.1
Mozilla Mozilla 1.7.2
Mozilla Mozilla 1.7
Mozilla Firefox 0.9.1
Mozilla Mozilla 1.4.1
Mozilla Mozilla 1.4
Mozilla Mozilla 1.6
Mozilla Firefox 0.10.1
Mozilla Firefox 0.8
Mozilla Mozilla 1.3
2.1
CVSSv2
CVE-2005-0578
Firefox prior to 1.0.1 and Mozilla Suite prior to 1.7.6 use a predictable filename for the plugin temporary directory, which allows local users to delete arbitrary files of other users via a symlink attack on the plugtmp directory.
Mozilla Firefox 0.10
Mozilla Firefox 0.10.1
Mozilla Firefox 1.0
Mozilla Mozilla 1.3
Mozilla Mozilla 1.5
Mozilla Mozilla 1.7.5
Mozilla Mozilla 1.7
Mozilla Firefox 0.9.1
Mozilla Firefox 0.9.2
Mozilla Mozilla 1.4
Mozilla Mozilla 1.6
Mozilla Mozilla 1.7.1
Mozilla Firefox 0.8
Mozilla Firefox 0.9
Mozilla Mozilla 1.4.1
Mozilla Firefox 0.9.3
Mozilla Mozilla 1.5.1
Mozilla Mozilla 1.7.2
Mozilla Mozilla 1.7.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6