Mozilla

Thunderbird

1713 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.82%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are calle...

  • EPSS 2.21%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to bypass same-origin protections and conduct cross-site scripting (XSS)...

  • EPSS 24.27%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute...

Exploit
  • EPSS 32.74%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the "clone parent" internal func...

Exploit
  • EPSS 39.01%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using an eval in an XBL method binding (XBL.method.eval) to create Javas...

  • EPSS 1.62%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to trick users into downloading and saving an executable file via an image that is overlaid by a transparent image li...

  • EPSS 33.12%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The CSS border-rendering code in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary ...

  • EPSS 2.19%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to spoof secure site indicators such as the locked icon by opening the trusted site in a popup window, then changing ...

  • EPSS 13.99%
  • Veröffentlicht 14.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remot...

Exploit
  • EPSS 10.4%
  • Veröffentlicht 07.03.2006 11:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The HTML rendering engine in Mozilla Thunderbird 1.5, when "Block loading of remote images in mail messages" is enabled, does not properly block external images from inline HTML attachments, which could allow remote attackers to obtain sensitive info...