Mozilla Firefox 1.5.x prior to 1.5.0.12 and 2.x prior to 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote malicious users to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox 1.5.0.1 |
||
mozilla firefox 1.5.0.7 |
||
mozilla firefox 1.5.0.8 |
||
mozilla firefox 1.5.6 |
||
mozilla firefox 1.5.7 |
||
mozilla seamonkey 1.1.2 |
||
mozilla firefox 1.5.0.5 |
||
mozilla firefox 1.5.0.6 |
||
mozilla firefox 1.5.4 |
||
mozilla firefox 1.5.5 |
||
mozilla firefox 2.0.0.3 |
||
mozilla seamonkey 1.0.9 |
||
mozilla firefox 1.5.0.10 |
||
mozilla firefox 1.5.0.11 |
||
mozilla firefox 1.5.0.9 |
||
mozilla firefox 1.5.1 |
||
mozilla firefox 1.5.8 |
||
mozilla firefox 2.0 |
||
mozilla firefox 1.5.0.2 |
||
mozilla firefox 1.5.0.3 |
||
mozilla firefox 1.5.0.4 |
||
mozilla firefox 1.5.2 |
||
mozilla firefox 1.5.3 |
||
mozilla firefox 2.0.0.1 |
||
mozilla firefox 2.0.0.2 |