Mozilla

Thunderbird

1542 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.53%
  • Veröffentlicht 21.12.2011 04:02:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.

  • EPSS 0.96%
  • Veröffentlicht 21.12.2011 04:02:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page.

  • EPSS 1.15%
  • Veröffentlicht 21.12.2011 04:02:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Mozilla Firefox before 9.0, Thunderbird before 9.0, and SeaMonkey before 2.6 on Mac OS X do not properly handle certain DOM frame deletions by plugins, which allows remote attackers to cause a denial of service (incorrect pointer dereference and appl...

  • EPSS 3.71%
  • Veröffentlicht 21.12.2011 04:02:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an Ogg VIDEO element that is not properly han...

  • EPSS 0.33%
  • Veröffentlicht 21.12.2011 04:02:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Mozilla Firefox before 3.6.25 and Thunderbird before 3.1.17 on Mac OS X do not consider .jar files to be executable files, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted file. NOTE: this vulnerabilit...

  • EPSS 75.88%
  • Veröffentlicht 21.12.2011 04:02:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly hav...

  • EPSS 3.75%
  • Veröffentlicht 21.12.2011 04:02:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or poss...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 07.12.2011 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Cascading Style Sheets (CSS) implementation in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about vi...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 07.12.2011 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The JavaScript implementation in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers ...

  • EPSS 0.18%
  • Veröffentlicht 07.12.2011 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The layout engine in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 executes different code for visited and unvisited links during the processing of Cascading Style Sheets (CSS) token sequences, which makes it easier for...