Mozilla

Seamonkey

704 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 4.32%
  • Veröffentlicht 21.11.2012 12:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attac...

Exploit
  • EPSS 4.32%
  • Veröffentlicht 21.11.2012 12:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote ...

Exploit
  • EPSS 6.39%
  • Veröffentlicht 21.11.2012 12:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to exe...

Exploit
  • EPSS 2.87%
  • Veröffentlicht 21.11.2012 12:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap ...

  • EPSS 2.16%
  • Veröffentlicht 21.11.2012 12:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service ...

Exploit
  • EPSS 2.61%
  • Veröffentlicht 21.11.2012 12:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code...

  • EPSS 6.75%
  • Veröffentlicht 21.11.2012 12:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attacker...

Exploit
  • EPSS 3.01%
  • Veröffentlicht 21.11.2012 12:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application cr...

  • EPSS 0.88%
  • Veröffentlicht 21.11.2012 12:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site reques...

Exploit
  • EPSS 1.36%
  • Veröffentlicht 29.10.2012 18:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), ...