Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mozilla thunderbird 3.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-25193
hb-ot-layout-gsubgpos.hh in HarfBuzz up to and including 6.0.0 allows malicious users to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
Harfbuzz Project Harfbuzz
Fedoraproject Fedora 36
9.3
CVSSv2
CVE-2012-3993
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox prior to 16.0, Firefox ESR 10.x prior to 10.0.8, Thunderbird prior to 16.0, Thunderbird ESR 10.x prior to 10.0.8, and SeaMonkey prior to 2.13 does not properly interact with failures of InstallTrigger methods, whic...
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0.7
Mozilla Thunderbird Esr 10.0
Mozilla Thunderbird Esr 10.0.1
Mozilla Thunderbird Esr 10.0.2
Mozilla Thunderbird Esr 10.0.3
Mozilla Thunderbird Esr 10.0.4
Mozilla Thunderbird Esr 10.0.5
Mozilla Thunderbird Esr 10.0.6
Mozilla Thunderbird Esr 10.0.7
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.2
Mozilla Firefox 1.0.3
Mozilla Firefox 1.0.4
Mozilla Firefox 1.0.5
1 EDB exploit
4.3
CVSSv2
CVE-2012-1956
Mozilla Firefox prior to 15.0, Thunderbird prior to 15.0, and SeaMonkey prior to 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote malicious users to conduct cross-site scripting (XSS)...
Mozilla Firefox 12.0
Mozilla Firefox 11.0
Mozilla Firefox 8.0.1
Mozilla Firefox 7.0.1
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.3
Mozilla Firefox 3.0.5
Mozilla Firefox 3.6.8
Mozilla Firefox 3.6.18
Mozilla Firefox 3.5.2
Mozilla Firefox 3.6.17
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.20
Mozilla Firefox 3.5.14
Mozilla Firefox 3.5.12
Mozilla Firefox 3.6.15
Mozilla Firefox 3.6.16
Mozilla Firefox 3.0.13
Mozilla Firefox 3.5.3
Mozilla Firefox 2.0.0.20
Mozilla Firefox 2.0.0.9
10
CVSSv2
CVE-2012-3958
Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allows remote malicious users to e...
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox 10.0.2
Mozilla Firefox 10.0
Mozilla Firefox 7.0
Mozilla Firefox 6.0.2
Mozilla Firefox 4.0
Mozilla Firefox 3.6.23
Mozilla Firefox 3.0
Mozilla Firefox 3.6.6
Mozilla Firefox 3.0.17
Mozilla Firefox 3.6.7
Mozilla Firefox 3.0.9
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.10
Mozilla Firefox 3.6.21
Mozilla Firefox 3.5.13
9.3
CVSSv2
CVE-2012-3962
Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 do not properly iterate through the characters in a text run, which allows remote malicious users to execute arbitrary cod...
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0
Mozilla Thunderbird Esr 10.0.5
Mozilla Thunderbird Esr 10.0
Mozilla Thunderbird Esr 10.0.1
Mozilla Thunderbird Esr 10.0.3
Mozilla Thunderbird Esr 10.0.4
Mozilla Thunderbird Esr 10.0.2
Mozilla Thunderbird Esr 10.0.6
Mozilla Firefox
Mozilla Firefox 12.0
Mozilla Firefox 9.0
Mozilla Firefox 8.0
Mozilla Firefox 5.0
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.25
10
CVSSv2
CVE-2012-3964
Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allows remote malicious users to execute arbitrary...
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0.4
Mozilla Thunderbird Esr 10.0
Mozilla Thunderbird Esr 10.0.1
Mozilla Thunderbird Esr 10.0.3
Mozilla Thunderbird Esr 10.0.4
Mozilla Thunderbird Esr 10.0.5
Mozilla Thunderbird Esr 10.0.2
Mozilla Thunderbird Esr 10.0.6
Mozilla Firefox
Mozilla Firefox 12.0
Mozilla Firefox 8.0
Mozilla Firefox 8.0.1
Mozilla Firefox 5.0
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.24
10
CVSSv2
CVE-2012-3966
Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a negative hei...
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.5
Mozilla Firefox 10.0.1
Mozilla Firefox 9.0.1
Mozilla Firefox 13.0
Mozilla Firefox
Mozilla Firefox 9.0
Mozilla Firefox 8.0
Mozilla Firefox 5.0.1
Mozilla Firefox 5.0
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.25
Mozilla Firefox 3.6.24
Mozilla Firefox 3.6.19
Mozilla Firefox 3.6.12
Mozilla Firefox 3.5.8
9.3
CVSSv2
CVE-2012-3969
Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allows remote malicious users to execute arbitrary co...
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.6
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0.4
Mozilla Thunderbird Esr 10.0.1
Mozilla Thunderbird Esr 10.0.2
Mozilla Thunderbird Esr 10.0.4
Mozilla Thunderbird Esr 10.0.5
Mozilla Thunderbird Esr 10.0
Mozilla Thunderbird Esr 10.0.6
Mozilla Thunderbird Esr 10.0.3
Mozilla Firefox 12.0
Mozilla Firefox 8.0
Mozilla Firefox 8.0.1
Mozilla Firefox 4.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.24
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6.8
10
CVSSv2
CVE-2012-3970
Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, Thunderbird prior to 15.0, Thunderbird ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 allows remote malicious users to execute arbitrary c...
Mozilla Firefox Esr 10.0.3
Mozilla Firefox Esr 10.0.4
Mozilla Firefox Esr 10.0.1
Mozilla Firefox Esr 10.0.2
Mozilla Firefox Esr 10.0
Mozilla Firefox Esr 10.0.5
Mozilla Firefox Esr 10.0.6
Mozilla Firefox 12.0
Mozilla Firefox 11.0
Mozilla Firefox 8.0.1
Mozilla Firefox 7.0.1
Mozilla Firefox 7.0
Mozilla Firefox 4.0
Mozilla Firefox 3.0.5
Mozilla Firefox 3.6.23
Mozilla Firefox 3.6.18
Mozilla Firefox
Mozilla Firefox 9.0
Mozilla Firefox 8.0
Mozilla Firefox 5.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.25
10
CVSSv2
CVE-2012-3971
Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox prior to 15.0, Thunderbird prior to 15.0, and SeaMonkey prior to 2.12, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the ...
Mozilla Firefox 10.0.1
Mozilla Firefox 9.0.1
Mozilla Firefox 6.0.1
Mozilla Firefox 6.0
Mozilla Firefox 4.0
Mozilla Firefox 13.0
Mozilla Firefox
Mozilla Firefox 12.0
Mozilla Firefox 9.0
Mozilla Firefox 8.0
Mozilla Firefox 5.0.1
Mozilla Firefox 5.0
Mozilla Firefox 4.0.1
Mozilla Firefox 3.6.25
Mozilla Firefox 3.6.24
Mozilla Firefox 3.6.19
Mozilla Firefox 3.6.12
Mozilla Firefox 3.5.8
Mozilla Firefox 3.0.16
Mozilla Firefox 3.0.2
Mozilla Firefox 3.0.14
Mozilla Firefox 3.6.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36954
CVE-2024-36933
CVE-2024-24919
CVE-2024-36923
CVE-2024-2961
CVE-2024-36925
bypass
encryption
command injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »