Mozilla

Thunderbird

1567 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 33.12%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The CSS border-rendering code in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary ...

  • EPSS 2.19%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to spoof secure site indicators such as the locked icon by opening the trusted site in a popup window, then changing ...

  • EPSS 13.99%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remot...

Exploit
  • EPSS 10.4%
  • Veröffentlicht 07.03.2006 11:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The HTML rendering engine in Mozilla Thunderbird 1.5, when "Block loading of remote images in mail messages" is enabled, does not properly block external images from inline HTML attachments, which could allow remote attackers to obtain sensitive info...

Exploit
  • EPSS 36%
  • Veröffentlicht 24.02.2006 22:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript U...

Exploit
  • EPSS 4.49%
  • Veröffentlicht 22.02.2006 02:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Mozilla Thunderbird 1.5 allows user-assisted attackers to cause an unspecified denial of service by tricking the user into importing an LDIF file with a long field into the address book, as demonstrated by a long homePhone field.

  • EPSS 1.28%
  • Veröffentlicht 02.02.2006 23:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The E4X implementation in Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 exposes the internal "AnyName" object to external interfaces, which allows multiple cooperating domains to exchange info...

  • EPSS 10.03%
  • Veröffentlicht 02.02.2006 22:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple integer overflows in Mozilla Firefox 1.5, Thunderbird 1.5 if Javascript is enabled in mail, and SeaMonkey before 1.0 might allow remote attackers to execute arbitrary code via the (1) EscapeAttributeValue in jsxml.c for E4X, (2) nsSVGCairoSu...

  • EPSS 7.64%
  • Veröffentlicht 02.02.2006 20:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 allow remote attackers to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to o...

  • EPSS 82.37%
  • Veröffentlicht 02.02.2006 20:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Mozilla Firefox 1.5, Thunderbird 1.5 if Javascript is enabled in mail, and SeaMonkey before 1.0 might allow remote attackers to execute arbitrary code via the QueryInterface method of the built-in Location and Navigator objects, which leads to memory...