The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird
allows?remote attackers to cause a denial of service (memory corruption
and application crash) or possibly execute arbitrary code
Mozilla
Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0,
does not properly handle a right-to-left override (aka RLO or U+202E)
Unicode character in a download filename, which allows remote attackers
to spoof file extensions via a crafted filename, as demonstrated by
displaying a non-executable extension for an executable file.
Heap-based buffer overflow in the GIF image parser in Mozilla Firefox
before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows
remote attackers to execute arbitrary code via unspecified vectors.