HomeMozillaCVE-2004-0826

CVE-2004-0826

UNKNOWN
7.5CVSS
Published: 2004-12-31
Updated: 2025-04-03
AI Analysis

Description

Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.

CVSS Metrics

Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector
network
Access Cmplx
low
Auth
none
Confidentiality
partial
Integrity
partial
Availability
partial
Weaknesses
NVD-CWE-Other

Metadata

Primary Vendor
MOZILLA
Published
12/31/2004
Last Modified
4/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

mozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesmozilla : network_security_servicesnetscape : certificate_servernetscape : certificate_servernetscape : directory_servernetscape : directory_servernetscape : directory_servernetscape : directory_servernetscape : directory_servernetscape : directory_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : enterprise_servernetscape : personalization_enginesun : java_enterprise_systemsun : java_enterprise_systemsun : java_system_application_serversun : java_system_application_serversun : java_system_application_serversun : java_system_application_serversun : java_system_application_serversun : one_application_serversun : one_application_serversun : one_application_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serversun : one_web_serverhp : hp-uxhp : hp-uxhp : hp-ux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief