Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox prior to 24.0, Thunderbird prior to 24.0, and SeaMonkey prior to 2.21 allows remote malicious users to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla seamonkey 2.14 |
||
mozilla seamonkey 2.13 |
||
mozilla seamonkey 2.12 |
||
mozilla seamonkey 2.11 |
||
mozilla seamonkey 2.1 |
||
mozilla seamonkey 2.0.9 |
||
mozilla seamonkey 2.0.8 |
||
mozilla seamonkey 2.0.14 |
||
mozilla seamonkey 2.0.13 |
||
mozilla seamonkey 2.0 |
||
mozilla seamonkey |
||
mozilla seamonkey 2.19 |
||
mozilla seamonkey 2.17.1 |
||
mozilla seamonkey 2.17 |
||
mozilla seamonkey 2.16 |
||
mozilla seamonkey 2.15 |
||
mozilla seamonkey 2.10 |
||
mozilla seamonkey 2.0.3 |
||
mozilla seamonkey 2.0.2 |
||
mozilla seamonkey 2.20 |
||
mozilla seamonkey 2.18 |
||
mozilla seamonkey 2.16.2 |
||
mozilla seamonkey 2.16.1 |
||
mozilla seamonkey 2.15.1 |
||
mozilla seamonkey 2.13.2 |
||
mozilla seamonkey 2.13.1 |
||
mozilla seamonkey 2.12.1 |
||
mozilla seamonkey 2.0.5 |
||
mozilla seamonkey 2.0.4 |
||
mozilla seamonkey 2.0.10 |
||
mozilla seamonkey 2.0.1 |
||
mozilla seamonkey 2.15.2 |
||
mozilla seamonkey 2.10.1 |
||
mozilla seamonkey 2.0.7 |
||
mozilla seamonkey 2.0.6 |
||
mozilla seamonkey 2.0.12 |
||
mozilla seamonkey 2.0.11 |
||
mozilla firefox 19.0.1 |
||
mozilla firefox 19.0 |
||
mozilla firefox 19.0.2 |
||
mozilla firefox |
||
mozilla firefox 23.0 |
||
mozilla firefox 20.0.1 |
||
mozilla firefox 20.0 |
||
mozilla firefox 22.0 |
||
mozilla firefox 21.0 |
||
mozilla thunderbird 17.0 |
||
mozilla thunderbird 17.0.6 |
||
mozilla thunderbird 17.0.7 |
||
mozilla thunderbird 17.0.4 |
||
mozilla thunderbird 17.0.5 |
||
mozilla thunderbird 17.0.1 |
||
mozilla thunderbird 17.0.2 |
||
mozilla thunderbird 17.0.3 |
||
mozilla thunderbird 17.0.8 |
||
mozilla thunderbird |