Lucene search

K

mozilla -- code execution via javascript: IconURL vulnerability

🗓️ 08 May 2005 00:00:00Reported by FreeBSDType 
freebsd
 freebsd
🔗 vuxml.freebsd.org👁 29 Views

A Mozilla Foundation Security Advisory reports two vulnerabilities in Firefox that allow for code execution via JavaScript and the "IconURL" parameter in "InstallTrigger.install()

Show more
Related
Detection
Packages
Refs
OSOS VersionArchitecturePackagePackage VersionFilename
FreeBSDanynoarchfirefox1.0.4,1UNKNOWN
FreeBSDanynoarchlinux-firefox1.0.4UNKNOWN
FreeBSDanynoarchmozilla1.7.8,2UNKNOWN
FreeBSDanynoarchlinux-mozilla1.7.8UNKNOWN
FreeBSDanynoarchlinux-mozilla-devel1.7.8UNKNOWN
FreeBSDanynoarchnetscape70UNKNOWN
FreeBSDanynoarchde-linux-mozillafirebird0UNKNOWN
FreeBSDanynoarchel-linux-mozillafirebird0UNKNOWN
FreeBSDanynoarchja-linux-mozillafirebird-gtk10UNKNOWN
FreeBSDanynoarchja-mozillafirebird-gtk20UNKNOWN
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo