A Mozilla Foundation Security Advisory reports two vulnerabilities in Firefox that allow for code execution via JavaScript and the "IconURL" parameter in "InstallTrigger.install()
Reporter | Title | Published | Views | Family All 33 |
---|---|---|---|---|
![]() | CVE-2005-1476 | 9 May 200504:00 | – | cvelist |
![]() | CVE-2005-1477 | 9 May 200504:00 | – | cvelist |
![]() | FreeBSD : mozilla -- code execution via javascript: IconURL vulnerability (eca6195a-c233-11d9-804c-02061b08fc24) | 13 Jul 200500:00 | – | nessus |
![]() | GLSA-200505-11 : Mozilla Suite, Mozilla Firefox: Remote compromise | 17 May 200500:00 | – | nessus |
![]() | RHEL 4 : mozilla (RHSA-2005:435) | 28 May 200500:00 | – | nessus |
![]() | CentOS 4 : firefox (CESA-2005:434) | 5 Jul 200600:00 | – | nessus |
![]() | RHEL 4 : firefox (RHSA-2005:434) | 28 May 200500:00 | – | nessus |
![]() | Mozilla Browser < 1.7.8 Multiple Vulnerabilities | 12 May 200500:00 | – | nessus |
![]() | CentOS 3 / 4 : mozilla (CESA-2005:435) | 3 Jul 200600:00 | – | nessus |
![]() | Firefox < 1.0.4 Multiple Vulnerabilities | 12 May 200500:00 | – | nessus |
Source | Link |
---|---|
mozilla | www.mozilla.org/security/announce/mfsa2005-42.html |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | firefox | 1.0.4,1 | UNKNOWN |
FreeBSD | any | noarch | linux-firefox | 1.0.4 | UNKNOWN |
FreeBSD | any | noarch | mozilla | 1.7.8,2 | UNKNOWN |
FreeBSD | any | noarch | linux-mozilla | 1.7.8 | UNKNOWN |
FreeBSD | any | noarch | linux-mozilla-devel | 1.7.8 | UNKNOWN |
FreeBSD | any | noarch | netscape7 | 0 | UNKNOWN |
FreeBSD | any | noarch | de-linux-mozillafirebird | 0 | UNKNOWN |
FreeBSD | any | noarch | el-linux-mozillafirebird | 0 | UNKNOWN |
FreeBSD | any | noarch | ja-linux-mozillafirebird-gtk1 | 0 | UNKNOWN |
FreeBSD | any | noarch | ja-mozillafirebird-gtk2 | 0 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo