Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mozilla thunderbird 3.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2023-25193
hb-ot-layout-gsubgpos.hh in HarfBuzz up to and including 6.0.0 allows malicious users to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
Harfbuzz Project Harfbuzz
Fedoraproject Fedora 36
NA
CVE-2012-3993
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox prior to 16.0, Firefox ESR 10.x prior to 10.0.8, Thunderbird prior to 16.0, Thunderbird ESR 10.x prior to 10.0.8, and SeaMonkey prior to 2.13 does not properly interact with failures of InstallTrigger methods, whic...
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0.7
Mozilla Thunderbird Esr 10.0
Mozilla Thunderbird Esr 10.0.1
Mozilla Thunderbird Esr 10.0.2
Mozilla Thunderbird Esr 10.0.3
Mozilla Thunderbird Esr 10.0.4
Mozilla Thunderbird Esr 10.0.5
Mozilla Thunderbird Esr 10.0.6
Mozilla Thunderbird Esr 10.0.7
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.2
Mozilla Firefox 1.0.3
Mozilla Firefox 1.0.4
Mozilla Firefox 1.0.5
1 EDB exploit
NA
CVE-2012-3962
Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 do not properly iterate through the characters in a text run, which allows remote malicious users to execute arbitrary cod...
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0
Mozilla Thunderbird Esr 10.0.5
Mozilla Thunderbird Esr 10.0
Mozilla Thunderbird Esr 10.0.1
Mozilla Thunderbird Esr 10.0.3
Mozilla Thunderbird Esr 10.0.4
Mozilla Thunderbird Esr 10.0.2
Mozilla Thunderbird Esr 10.0.6
Mozilla Firefox
Mozilla Firefox 12.0
Mozilla Firefox 9.0
Mozilla Firefox 8.0
Mozilla Firefox 5.0
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.25
NA
CVE-2012-3964
Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allows remote malicious users to execute arbitrary...
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0.4
Mozilla Thunderbird Esr 10.0
Mozilla Thunderbird Esr 10.0.1
Mozilla Thunderbird Esr 10.0.3
Mozilla Thunderbird Esr 10.0.4
Mozilla Thunderbird Esr 10.0.5
Mozilla Thunderbird Esr 10.0.2
Mozilla Thunderbird Esr 10.0.6
Mozilla Firefox
Mozilla Firefox 12.0
Mozilla Firefox 8.0
Mozilla Firefox 8.0.1
Mozilla Firefox 5.0
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.24
NA
CVE-2012-3966
Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a negative hei...
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.5
Mozilla Firefox 10.0.1
Mozilla Firefox 9.0.1
Mozilla Firefox 13.0
Mozilla Firefox
Mozilla Firefox 9.0
Mozilla Firefox 8.0
Mozilla Firefox 5.0.1
Mozilla Firefox 5.0
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.25
Mozilla Firefox 3.6.24
Mozilla Firefox 3.6.19
Mozilla Firefox 3.6.12
Mozilla Firefox 3.5.8
NA
CVE-2012-3969
Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allows remote malicious users to execute arbitrary co...
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0.4
Mozilla Thunderbird Esr 10.0.1
Mozilla Thunderbird Esr 10.0.2
Mozilla Thunderbird Esr 10.0.4
Mozilla Thunderbird Esr 10.0.5
Mozilla Thunderbird Esr 10.0
Mozilla Thunderbird Esr 10.0.6
Mozilla Thunderbird Esr 10.0.3
Mozilla Firefox 12.0
Mozilla Firefox 8.0
Mozilla Firefox 8.0.1
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.24
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6.8
NA
CVE-2012-3970
Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allows remote malicious users to execute arbitrary c...
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0.6
Mozilla Firefox 12.0
Mozilla Firefox 11.0
Mozilla Firefox 8.0.1
Mozilla Firefox 7.0.1
Mozilla Firefox 7.0
Mozilla Firefox 4.0
Mozilla Firefox 3.0.5
Mozilla Firefox 3.6.23
Mozilla Firefox 3.6.18
Mozilla Firefox
Mozilla Firefox 9.0
Mozilla Firefox 8.0
Mozilla Firefox 5.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.25
NA
CVE-2012-3971
Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox prior to 15.0, Thunderbird prior to 15.0, and SeaMonkey prior to 2.12, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the ...
Mozilla Firefox 10.0.1
Mozilla Firefox 9.0.1
Mozilla Firefox 6.0.1
Mozilla Firefox 6.0
Mozilla Firefox 4.0
Mozilla Firefox 13.0
Mozilla Firefox
Mozilla Firefox 12.0
Mozilla Firefox 9.0
Mozilla Firefox 8.0
Mozilla Firefox 5.0.1
Mozilla Firefox 5.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.25
Mozilla Firefox 3.6.24
Mozilla Firefox 3.6.19
Mozilla Firefox 3.6.12
Mozilla Firefox 3.5.8
Mozilla Firefox 3.0.16
Mozilla Firefox 3.0.2
Mozilla Firefox 3.0.14
Mozilla Firefox 3.6.2
NA
CVE-2012-3974
Untrusted search path vulnerability in the installer in Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, and Thunderbird ESR 10.x prior to 10.0.7 on Windows allows local users to gain privileges via a Trojan horse executable file in a ro...
Mozilla Firefox 11.0
Mozilla Firefox 10.0.2
Mozilla Firefox 7.0
Mozilla Firefox 6.0.2
Mozilla Firefox 4.0
Mozilla Firefox 3.6.23
Mozilla Firefox 3.0
Mozilla Firefox 3.6.6
Mozilla Firefox 3.0.17
Mozilla Firefox 3.6.17
Mozilla Firefox 3.0.9
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.10
Mozilla Firefox 3.6.21
Mozilla Firefox 3.0.3
Mozilla Firefox 3.5.13
Mozilla Firefox 3.6.16
Mozilla Firefox 3.6.14
Mozilla Firefox 3.5.15
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.6
Mozilla Firefox 2.0.0.17
NA
CVE-2012-3975
The DOMParser component in Mozilla Firefox prior to 15.0, Thunderbird prior to 15.0, and SeaMonkey prior to 2.12 loads subresources during parsing of text/html data within an extension, which allows remote malicious users to obtain sensitive information by providing crafted data ...
Mozilla Firefox 12.0
Mozilla Firefox 8.0
Mozilla Firefox 8.0.1
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.24
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6.8
Mozilla Firefox 3.6.18
Mozilla Firefox 3.0.16
Mozilla Firefox 3.5.2
Mozilla Firefox 3.0.14
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.20
Mozilla Firefox 3.5.14
Mozilla Firefox 3.5.12
Mozilla Firefox 3.0.12
Mozilla Firefox 3.6.15
Mozilla Firefox 3.0.13
Mozilla Firefox 3.5.3
Mozilla Firefox 13.0
Mozilla Firefox
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »