Mozilla

Seamonkey

704 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 94.03%
  • Published 21.05.2015 00:59:00
  • Last modified 12.04.2025 10:46:40

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a Clie...

  • EPSS 7.61%
  • Published 14.05.2015 10:59:00
  • Last modified 12.04.2025 10:46:40

GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbi...

  • EPSS 1.28%
  • Published 24.03.2015 00:59:07
  • Last modified 12.04.2025 10:46:40

Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.

  • EPSS 3.91%
  • Published 24.03.2015 00:59:05
  • Last modified 12.04.2025 10:46:40

The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which...

  • EPSS 0.66%
  • Published 14.01.2015 11:59:10
  • Last modified 12.04.2025 10:46:40

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the networ...

  • EPSS 1.84%
  • Published 14.01.2015 11:59:09
  • Last modified 12.04.2025 10:46:40

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

  • EPSS 1.14%
  • Published 14.01.2015 11:59:08
  • Last modified 12.04.2025 10:46:40

The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a d...

  • EPSS 0.18%
  • Published 14.01.2015 11:59:07
  • Last modified 12.04.2025 10:46:40

The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-contro...

  • EPSS 1.48%
  • Published 14.01.2015 11:59:07
  • Last modified 12.04.2025 10:46:40

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows ...

  • EPSS 0.49%
  • Published 14.01.2015 11:59:06
  • Last modified 12.04.2025 10:46:40

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed ...