Show filters
228 Total Results
Displaying 131-140 of 228
Sort by:
Attacker Value
Unknown
CVE-2012-4208
Disclosure Date: November 21, 2012 (last updated October 05, 2023)
The XrayWrapper implementation in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 does not consider the compartment during property filtering, which allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.
0
Attacker Value
Unknown
CVE-2012-4212
Disclosure Date: November 21, 2012 (last updated October 05, 2023)
Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-4215
Disclosure Date: November 21, 2012 (last updated October 22, 2024)
Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-4217
Disclosure Date: November 21, 2012 (last updated October 05, 2023)
Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-4218
Disclosure Date: November 21, 2012 (last updated October 05, 2023)
Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-4205
Disclosure Date: November 21, 2012 (last updated October 05, 2023)
Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
0
Attacker Value
Unknown
CVE-2012-4564
Disclosure Date: November 11, 2012 (last updated October 05, 2023)
ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2012-5821
Disclosure Date: November 04, 2012 (last updated February 09, 2024)
Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.
0
Attacker Value
Unknown
CVE-2012-4194
Disclosure Date: October 29, 2012 (last updated October 22, 2024)
Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
0
Attacker Value
Unknown
CVE-2012-4196
Disclosure Date: October 29, 2012 (last updated October 22, 2024)
Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
0