Debian Security Advisory DSA 866-1 - Several security-related problems have been discovered in Mozilla and derived programs.
2701ccface00fab6d0fc16bc4aaa3111bf0eddb9408cdc76a4b8aa9b292a205c
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Mozilla, where the vulnerability could be exploited to allow a remote, unauthorized user to execute privileged code or to create a Denial of Service (DoS).
6630a06078216319d840bb039f6ddcc1e54966ad7749cb96f94b5d3656cf51a7
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Mozilla, where a heap overflow could be exploited to allow a remote, unauthorized user to execute privileged code.
447c5def70dcb2ede956183b5047d65de70429a61059fdbdc740977e079b05e2
PwnZilla 5 - Exploit for the IDN host name heap buffer overrun in Mozilla browsers such as Firefox, Mozilla, and Netscape.
5fd84b75e862d1b3f6cac437ba7e571a8da0bd7fe4f45638c172f865b261d320
Gentoo Linux Security Advisory GLSA 200509-11 - The Mozilla Suite and Firefox are both vulnerable to a buffer overflow while processing hostnames containing multiple hyphens. Note that browsers that have disabled IDN support are immune to this flaw. Versions less than or equal to 1.0.6-r6 are affected.
e2ddda670fca270b023918ae6376910370295f5b74fca04c5f46add1e5036841
Ubuntu Security Notice USN-181-1 - Tom Ferris discovered a buffer overflow in the Mozilla products (Mozilla browser, Firefox, Thunderbird). By tricking an user to click on a Hyperlink with a specially crafted destination URL, a remote attacker could crash the application. It might even be possible to exploit this vulnerability to execute arbitrary code, but this has not yet been confirmed.
3b223821c2ce5a857a5b2f633896042c055216b8d5f8278366f84df4cab5d47f