Mozilla

Seamonkey

704 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Published 07.12.2011 19:55:01
  • Last modified 11.04.2025 00:51:21

The layout engine in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 executes different code for visited and unvisited links during the processing of Cascading Style Sheets (CSS) token sequences, which makes it easier for...

  • EPSS 0.42%
  • Published 29.09.2011 00:55:03
  • Last modified 11.04.2025 00:51:21

Mozilla Firefox before 7.0 and SeaMonkey before 2.4 do not properly restrict availability of motion data events, which makes it easier for remote attackers to read keystrokes by leveraging JavaScript code running in a background tab.

  • EPSS 0.43%
  • Published 29.09.2011 00:55:01
  • Last modified 11.04.2025 00:51:21

Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended ac...

  • EPSS 1.88%
  • Published 29.09.2011 00:55:01
  • Last modified 11.04.2025 00:51:21

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application cra...

  • EPSS 2.98%
  • Published 29.09.2011 00:55:01
  • Last modified 11.04.2025 00:51:21

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitr...

  • EPSS 0.72%
  • Published 29.09.2011 00:55:01
  • Last modified 11.04.2025 00:51:21

Mozilla Firefox before 3.6.23 and 4.x through 5, Thunderbird before 6.0, and SeaMonkey before 2.3 do not properly handle "location" as the name of a frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, a diffe...

  • EPSS 1.3%
  • Published 29.09.2011 00:55:01
  • Last modified 11.04.2025 00:51:21

Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote a...

  • EPSS 0.2%
  • Published 29.09.2011 00:55:01
  • Last modified 11.04.2025 00:51:21

Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions ...

  • EPSS 2.07%
  • Published 29.09.2011 00:55:01
  • Last modified 11.04.2025 00:51:21

Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application ...

  • EPSS 1.51%
  • Published 29.09.2011 00:55:01
  • Last modified 11.04.2025 00:51:21

Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting ...