Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mozilla firefox 2.0 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2006-6497
Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x prior to 2.0.0.1, 1.5.x prior to 1.5.0.9, Thunderbird prior to 1.5.0.9, and SeaMonkey prior to 1.0.7 allow remote malicious users to cause a denial of service (memory corruption and crash) and possi...
Mozilla Firefox
Mozilla Seamonkey
Mozilla Thunderbird
Mozilla Firefox 2.0
10
CVSSv2
CVE-2008-2786
Buffer overflow in Firefox 3.0 and 2.0.x has unknown impact and attack vectors. NOTE: due to lack of details as of 20080619, it is not clear whether this is the same issue as CVE-2008-2785. A CVE identifier has been assigned for tracking purposes.
Mozilla Firefox 2.0
Mozilla Firefox 3.0
6.4
CVSSv2
CVE-2006-6585
The Extensions manager in Mozilla Firefox 2.0 does not properly populate the list of local extensions, which allows malicious users to construct an extension that hides itself by finding its name in the list and then calling RemoveElement, as demonstrated by the FFsniFF extension...
Mozilla Firefox 2.0
Mozilla Firefox 3.0
5
CVSSv2
CVE-2006-6077
The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and previous versions; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for...
Mozilla Firefox 1.5
Mozilla Firefox 1.5.0.6
Mozilla Firefox 1.5.0.3
Mozilla Firefox
Mozilla Firefox 1.5.0.7
Mozilla Firefox 2.0
Mozilla Firefox 1.5.0.5
Mozilla Firefox 1.5.0.2
Netscape Navigator 8.1.2
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
5
CVSSv2
CVE-2006-5633
Firefox 1.5.0.7 and 2.0, and Seamonkey 1.1b, allows remote malicious users to cause a denial of service (crash) by creating a range object using createRange, calling selectNode on a DocType node (DOCUMENT_TYPE_NODE), then calling createContextualFragment on the range, which trigg...
Mozilla Seamonkey 1.1
Mozilla Firefox 1.5.0.7
Mozilla Firefox 2.0
1 EDB exploit
7.5
CVSSv2
CVE-2008-3835
The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox prior to 2.0.0.17, Thunderbird prior to 2.0.0.17, and SeaMonkey prior to 1.1.12 allows remote malicious users to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey
Mozilla Thunderbird 1.5.0.7
Mozilla Firefox 0.9 Rc
Mozilla Thunderbird 0.6
Mozilla Seamonkey 1.0.3
Mozilla Firefox 0.8
Mozilla Firefox 2.0.0.12
Mozilla Thunderbird 0.7.2
Mozilla Firefox 1.5
Mozilla Thunderbird 2.0.0.4
Mozilla Firefox 1.5.2
Mozilla Seamonkey 1.0.1
Mozilla Thunderbird 2.0.0.6
Mozilla Seamonkey 1.0.6
Mozilla Firefox 1.5.0.6
Mozilla Firefox 1.8
Mozilla Seamonkey 1.0.9
Mozilla Thunderbird 0.3
Mozilla Firefox 1.5.0.10
Mozilla Firefox 1.5.0.3
Mozilla Thunderbird 0.2
4.3
CVSSv2
CVE-2007-2869
The form autocomplete feature in Mozilla Firefox 1.5.x prior to 1.5.0.12, 2.x prior to 2.0.0.4, and possibly earlier versions, allows remote malicious users to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.
Mozilla Firefox 1.5.0.6
Mozilla Firefox 2.0.0.2
Mozilla Firefox 1.5.0.10
Mozilla Firefox 1.5.0.3
Mozilla Firefox 1.5.0.11
Mozilla Firefox 1.5
Mozilla Firefox 1.5.0.7
Mozilla Firefox 2.0
Mozilla Firefox 1.5.0.8
Mozilla Firefox 2.0.0.3
Mozilla Firefox 1.5.0.9
Mozilla Firefox 1.5.0.5
Mozilla Firefox 1.5.0.2
Mozilla Firefox 2.0.0.1
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
7.5
CVSSv2
CVE-2008-4060
Mozilla Firefox prior to 2.0.0.17 and 3.x prior to 3.0.2, Thunderbird prior to 2.0.0.17, and SeaMonkey prior to 1.1.12 allow remote malicious users to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1)...
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey
Mozilla Thunderbird 1.5.0.7
Mozilla Firefox 0.9 Rc
Mozilla Thunderbird 0.6
Mozilla Seamonkey 1.0.3
Mozilla Firefox 0.8
Mozilla Firefox 2.0.0.12
Mozilla Thunderbird 0.7.2
Mozilla Firefox 1.5
Mozilla Thunderbird 2.0.0.4
Mozilla Firefox 1.5.2
Mozilla Seamonkey 1.0.1
Mozilla Thunderbird 2.0.0.6
Mozilla Seamonkey 1.0.6
Mozilla Firefox 1.5.0.6
Mozilla Firefox 1.8
Mozilla Seamonkey 1.0.9
Mozilla Thunderbird 0.3
Mozilla Firefox 1.5.0.10
Mozilla Firefox 1.5.0.3
Mozilla Thunderbird 0.2
7.5
CVSSv2
CVE-2008-5504
Mozilla Firefox 2.x prior to 2.0.0.19 allows remote malicious users to run arbitrary JavaScript with chrome privileges via vectors related to the feed preview, a different vulnerability than CVE-2008-3836.
Mozilla Firefox 2.0.0.12
Mozilla Firefox 2.0.0.2
Mozilla Firefox 2.0.0.7
Mozilla Firefox 2.0.0.9
Mozilla Firefox 2.0.0.16
Mozilla Firefox 2.0.0.17
Mozilla Firefox 2.0.0.15
Mozilla Firefox 2.0
Mozilla Firefox 2.0.0.14
Mozilla Firefox 2.0.0.3
Mozilla Firefox 2.0.0.6
Mozilla Firefox 2.0.0.11
Mozilla Firefox 2.0.0.4
Mozilla Firefox 2.0.0.13
Mozilla Firefox 2.0.0.1
Mozilla Firefox 2.0.0.8
Mozilla Firefox
Mozilla Firefox 2.0.0.5
Mozilla Firefox 2.0.0.10
4.3
CVSSv2
CVE-2007-2870
Mozilla Firefox 1.5.x prior to 1.5.0.12 and 2.x prior to 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote malicious users to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener f...
Mozilla Firefox 1.5.0.6
Mozilla Seamonkey 1.0.9
Mozilla Firefox 2.0.0.2
Mozilla Firefox 1.5.0.10
Mozilla Firefox 1.5.0.3
Mozilla Firefox 1.5.0.11
Mozilla Firefox 1.5
Mozilla Seamonkey 1.1.2
Mozilla Firefox 1.5.0.7
Mozilla Firefox 2.0
Mozilla Firefox 1.5.0.8
Mozilla Firefox 2.0.0.3
Mozilla Firefox 1.5.0.9
Mozilla Firefox 1.5.0.5
Mozilla Firefox 1.5.0.2
Mozilla Firefox 2.0.0.1
Mozilla Firefox 1.5.0.4
Mozilla Firefox 1.5.0.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »