Loading...
Loading...
Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.
June 20, 2007
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2007-3285
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.