Mozilla

Seamonkey

704 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Published 28.08.2009 15:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox 3.5.1 and SeaMonkey 1.1.17, and Flock 2.5.1, allow context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by ...

  • EPSS 0.65%
  • Published 13.08.2009 16:30:00
  • Last modified 09.04.2025 00:30:58

mailnews in Mozilla Thunderbird before 2.0.0.18 and SeaMonkey before 1.1.13, when JavaScript is enabled in mail, allows remote attackers to obtain sensitive information about the recipient, or comments in forwarded mail, via script that reads the (1)...

Media report
  • EPSS 1.69%
  • Published 30.07.2009 19:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certif...

  • EPSS 19.94%
  • Published 22.07.2009 18:30:00
  • Last modified 09.04.2025 00:30:58

The nsXULTemplateQueryProcessorRDF::CheckIsSeparator function in Mozilla Firefox before 3.0.12, SeaMonkey 2.0a1pre, and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arb...

  • EPSS 10.79%
  • Published 20.07.2009 18:30:01
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox before 2.0.0.19 and 3.x before 3.0.5, SeaMonkey, and Thunderbird allow remote attackers to cause a denial of service (memory consumption and application crash) via a large integer value for the length property of a Select object, a re...

Exploit
  • EPSS 41.05%
  • Published 01.07.2009 13:00:01
  • Last modified 09.04.2025 00:30:58

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD...

  • EPSS 5.53%
  • Published 25.06.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that...

Exploit
  • EPSS 15.73%
  • Published 12.06.2009 21:30:00
  • Last modified 09.04.2025 00:30:58

The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vect...

Exploit
  • EPSS 10.37%
  • Published 12.06.2009 21:30:00
  • Last modified 09.04.2025 00:30:58

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors involving "double fra...

Exploit
  • EPSS 10.37%
  • Published 12.06.2009 21:30:00
  • Last modified 09.04.2025 00:30:58

The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vec...