Show filters
264 Total Results
Displaying 71-80 of 264
Sort by:
Attacker Value
Unknown

CVE-2011-2983

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.
0
Attacker Value
Unknown

CVE-2011-2991

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement JavaScript, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2011-2992

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
The Ogg reader in the browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2011-2989

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement WebGL, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2011-2985

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
0
Attacker Value
Unknown

CVE-2011-2987

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
Heap-based buffer overflow in Almost Native Graphics Layer Engine (ANGLE), as used in the WebGL implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products might allow remote attackers to execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2011-2981

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
0
Attacker Value
Unknown

CVE-2011-2984

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events.
0
Attacker Value
Unknown

CVE-2011-2986

Disclosure Date: August 18, 2011 (last updated October 04, 2023)
Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products, when the Direct2D (aka D2D) API is used on Windows, allows remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.
0
Attacker Value
Unknown

CVE-2008-7293

Disclosure Date: August 09, 2011 (last updated October 04, 2023)
Mozilla Firefox before 4 cannot properly restrict modifications to cookies established in HTTPS sessions, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response, related to lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, aka a "cookie forcing" issue.
0