Mozilla

Seamonkey

704 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.03%
  • Published 17.12.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.

  • EPSS 2.58%
  • Published 17.12.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with ...

  • EPSS 0.69%
  • Published 17.12.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the ...

  • EPSS 2.43%
  • Published 17.12.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to execute arbitrary JavaScript with chrome privileges by leveraging a reference to a chrome window from a content window, related to the window...

  • EPSS 0.81%
  • Published 17.12.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote ...

  • EPSS 1.99%
  • Published 29.10.2009 14:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.

  • EPSS 13.49%
  • Published 29.10.2009 14:30:00
  • Last modified 09.04.2025 00:30:58

Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.

  • EPSS 2.53%
  • Published 29.10.2009 14:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via...

Exploit
  • EPSS 0.39%
  • Published 31.08.2009 16:30:06
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly block data: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting ...

Exploit
  • EPSS 0.29%
  • Published 31.08.2009 16:30:06
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted re...