Show filters
288 Total Results
Displaying 71-80 of 288
Sort by:
Attacker Value
Unknown
CVE-2012-0457
Disclosure Date: March 14, 2012 (last updated October 22, 2024)
Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation.
0
Attacker Value
Unknown
CVE-2011-3670
Disclosure Date: February 01, 2012 (last updated October 04, 2023)
Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.
0
Attacker Value
Unknown
CVE-2011-3661
Disclosure Date: December 21, 2011 (last updated October 04, 2023)
YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
0
Attacker Value
Unknown
CVE-2011-3660
Disclosure Date: December 21, 2011 (last updated October 04, 2023)
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors.
0
Attacker Value
Unknown
CVE-2011-3663
Disclosure Date: December 21, 2011 (last updated October 04, 2023)
Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page.
0
Attacker Value
Unknown
CVE-2011-3664
Disclosure Date: December 21, 2011 (last updated October 04, 2023)
Mozilla Firefox before 9.0, Thunderbird before 9.0, and SeaMonkey before 2.6 on Mac OS X do not properly handle certain DOM frame deletions by plugins, which allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) or possibly have unspecified other impact via a crafted web site.
0
Attacker Value
Unknown
CVE-2011-3665
Disclosure Date: December 21, 2011 (last updated October 04, 2023)
Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an Ogg VIDEO element that is not properly handled after scaling.
0
Attacker Value
Unknown
CVE-2011-3666
Disclosure Date: December 21, 2011 (last updated October 04, 2023)
Mozilla Firefox before 3.6.25 and Thunderbird before 3.1.17 on Mac OS X do not consider .jar files to be executable files, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted file. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-2372 on Mac OS X.
0
Attacker Value
Unknown
CVE-2002-2437
Disclosure Date: December 07, 2011 (last updated October 04, 2023)
The JavaScript implementation in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method.
0
Attacker Value
Unknown
CVE-2010-5074
Disclosure Date: December 07, 2011 (last updated October 04, 2023)
The layout engine in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 executes different code for visited and unvisited links during the processing of Cascading Style Sheets (CSS) token sequences, which makes it easier for remote attackers to obtain sensitive information about visited web pages via a timing attack.
0