Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mozilla thunderbird 0.4 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-15969
Use after free in WebRTC in Google Chrome before 86.0.4240.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Backports Sle 15.0
Apple Ipados
Apple Safari
Apple Watchos
Apple Macos
Apple Tvos
Apple Iphone Os
6.5
CVSSv3
CVE-2020-16042
Uninitialized Use in V8 in Google Chrome before 87.0.4280.88 allowed a remote malicious user to obtain potentially sensitive information from process memory via a crafted HTML page.
Google Chrome
6.5
CVSSv3
CVE-2020-15999
Heap buffer overflow in Freetype in Google Chrome before 86.0.4240.111 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Freetype Freetype
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Opensuse Backports Sle 15.0
7 Github repositories
3 Articles
6.5
CVSSv3
CVE-2020-6514
Inappropriate implementation in WebRTC in Google Chrome before 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Apple Tvos
Apple Iphone Os
Apple Safari
Apple Watchos
Apple Ipados
1 Github repository
4.3
CVSSv3
CVE-2020-16012
Side-channel information leakage in graphics in Google Chrome before 87.0.4280.66 allowed a remote malicious user to leak cross-origin data via a crafted HTML page.
Google Chrome
Mozilla Firefox
1 Github repository
NA
CVE-2015-0822
The Form Autocompletion feature in Mozilla Firefox prior to 36.0, Firefox ESR 31.x prior to 31.5, and Thunderbird prior to 31.5 allows remote malicious users to read arbitrary files via crafted JavaScript code.
Mozilla Firefox 32.0
Mozilla Firefox 31.1.0
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6.22
Mozilla Firefox 3.6.21
Mozilla Firefox 3.6.14
Mozilla Firefox 3.6.13
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.17
Mozilla Firefox 3.5.16
Mozilla Firefox 3.5
Mozilla Firefox 3.0.9
Mozilla Firefox 3.0.2
Mozilla Firefox
Mozilla Firefox 3.6.9
Mozilla Firefox 3.6.8
Mozilla Firefox 3.6.26
Mozilla Firefox 3.6.25
Mozilla Firefox 3.6.18
Mozilla Firefox 3.6.17
NA
CVE-2015-0827
Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox prior to 36.0, Firefox ESR 31.x prior to 31.5, and Thunderbird prior to 31.5 allows remote malicious users to obtain sensitive information from uninitialized process memory via a malformed SVG gr...
Mozilla Firefox 30.0
Mozilla Firefox 3.6.9
Mozilla Firefox 3.6.27
Mozilla Firefox 3.6.26
Mozilla Firefox 3.6.19
Mozilla Firefox 3.6.18
Mozilla Firefox 3.6.11
Mozilla Firefox 3.6.10
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.13
Mozilla Firefox 3.5.12
Mozilla Firefox 3.0.7
Mozilla Firefox 3.0.6
Mozilla Firefox 3.0.17
Mozilla Firefox 3.0.16
Mozilla Firefox 3.0
Mozilla Firefox 29.0.1
Mozilla Firefox 25.0
Mozilla Firefox 24.1.1
Mozilla Firefox 20.0.1
Mozilla Firefox 20.0
NA
CVE-2015-0831
Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox prior to 36.0, Firefox ESR 31.x prior to 31.5, and Thunderbird prior to 31.5 allows remote malicious users to execute arbitrary code or cause a denial of service (...
Mozilla Thunderbird
Mozilla Thunderbird 31.3
Mozilla Thunderbird 31.0
Mozilla Thunderbird 31.2
Mozilla Thunderbird 31.1.2
Mozilla Firefox 33.0
Mozilla Firefox 32.0
Mozilla Firefox 3.6.6
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6.22
Mozilla Firefox 3.6.21
Mozilla Firefox 3.6.15
Mozilla Firefox 3.6.14
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.17
Mozilla Firefox 3.5.16
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5
Mozilla Firefox 3.0.2
Mozilla Firefox 3.0.19
1 Article
NA
CVE-2015-0833
Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox prior to 36.0, Firefox ESR 31.x prior to 31.5, and Thunderbird prior to 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) t...
Opensuse Evergreen 11.4
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Mozilla Firefox 31.1.0
Mozilla Firefox 31.0
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6.28
Mozilla Firefox 3.6.20
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.13
Mozilla Firefox 3.6.12
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.15
Mozilla Firefox 3.5.14
Mozilla Firefox 3.0.9
Mozilla Firefox 3.0.8
Mozilla Firefox 3.0.19
Mozilla Firefox 3.0.18
Mozilla Firefox 3.0.10
Mozilla Firefox 3.0.1
Mozilla Firefox 33.0
NA
CVE-2015-0836
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox prior to 36.0, Firefox ESR 31.x prior to 31.5, and Thunderbird prior to 31.5 allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbit...
Mozilla Firefox Esr 31.1.1
Mozilla Firefox Esr 31.2
Mozilla Firefox Esr 31.5
Mozilla Firefox Esr 31.0
Mozilla Firefox Esr 31.1
Mozilla Firefox Esr 31.3
Mozilla Firefox Esr 31.4
Mozilla Thunderbird 31.2
Mozilla Thunderbird 31.1.2
Mozilla Thunderbird 31.0
Mozilla Thunderbird
Mozilla Thunderbird 31.3
Mozilla Firefox 31.0
Mozilla Firefox 30.0
Mozilla Firefox 3.6.28
Mozilla Firefox 3.6.27
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.19
Mozilla Firefox 3.6.12
Mozilla Firefox 3.6.11
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.4
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »