Computer Security
[EN] securityvulns.ru no-pyccku


Multiple Mozilla Firefox / Thunderbird / Seamonkey security vulnerabilities
Published:20.12.2006
Source:
SecurityVulns ID:6959
Type:client
Threat Level:
7/10
Description:Crossite scripting with functions prototypes. Information leak. Buffer overflows on oversized Content-Type fields in messages. Memory corruption on SVG header. Crossite scripting with img.src. DoS. JavaScript watchpoint privilege escalation. CSS image cursor property buffer overflow. Multiple memory corruptions.
Affected:MOZILLA : Thunderbird 1.5
 MOZILLA : Firefox 1.5
 MOZILLA : Seamonkey 1.0
 MOZILLA : Firefox 2.0
Original documentdocumentMOZILLA, Mozilla Foundation Security Advisory 2006-68 (20.12.2006)
 documentMOZILLA, Mozilla Foundation Security Advisory 2006-69 (20.12.2006)
 documentMOZILLA, Mozilla Foundation Security Advisory 2006-70 (20.12.2006)
 documentMOZILLA, Mozilla Foundation Security Advisory 2006-71 (20.12.2006)
 documentMOZILLA, Mozilla Foundation Security Advisory 2006-72 (20.12.2006)
 documentZDI, [Full-disclosure] ZDI-06-051: Mozilla Firefox SVG Processing Remote Code Execution Vulnerability (20.12.2006)
 documentMOZILLA, Mozilla Foundation Security Advisory 2006-73 (20.12.2006)
 documentMOZILLA, Mozilla Foundation Security Advisory 2006-74 (20.12.2006)
 documentMOZILLA, Mozilla Foundation Security Advisory 2006-75 (20.12.2006)
 documentMOZILLA, Mozilla Foundation Security Advisory 2006-76 (20.12.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod