Mozilla

Seamonkey

704 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 15.05%
  • Veröffentlicht 12.06.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Visual truncation vulnerability in netwerk/dns/src/nsIDNService.cpp in Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 allows remote attackers to spoof the location bar via an IDN with invalid Unicode characters that are displayed as whites...

Exploit
  • EPSS 1.51%
  • Veröffentlicht 12.06.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML docu...

Exploit
  • EPSS 2.03%
  • Veröffentlicht 12.06.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attacke...

  • EPSS 4.63%
  • Veröffentlicht 12.06.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary...

  • EPSS 1.39%
  • Veröffentlicht 12.06.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Mozilla Firefox before 3.0.11, Thunderbird, and SeaMonkey do not check content policy before loading a script file into a XUL document, which allows remote attackers to bypass intended access restrictions via a crafted HTML document, as demonstrated ...

  • EPSS 4.24%
  • Veröffentlicht 12.06.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to execute arbitrary web script with the privileges of a chrome object, as demonstrated by t...

Exploit
  • EPSS 3.28%
  • Veröffentlicht 22.04.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1...

  • EPSS 2.08%
  • Veröffentlicht 22.04.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGE...

Exploit
  • EPSS 5.02%
  • Veröffentlicht 22.04.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving ...

Exploit
  • EPSS 3.52%
  • Veröffentlicht 22.04.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP...