Versions of Mozilla Thunderbird prior to 3.1.3 are vulnerable to multiple memory safety issues, dangling pointer vulnerabilities, and integer overflow, allowing for arbitrary code execution and heap buffer overflow
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Prion | Integer overflow | 30 Jul 201020:30 | – | prion |
Prion | Design/Logic Flaw | 9 Sep 201019:00 | – | prion |
Tenable Nessus | SeaMonkey < 2.0.7 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
Tenable Nessus | Mozilla Thunderbird 3.0.x < 3.0.7 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
Tenable Nessus | SeaMonkey < 2.0.7 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
Tenable Nessus | Mozilla Firefox 3.5.x < 3.5.12 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
Tenable Nessus | Firefox 3.5.x < 3.5.12 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
Tenable Nessus | Mozilla Firefox 3.6.x < 3.6.9 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
Tenable Nessus | Firefox 3.6.x < 3.6.9 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
Tenable Nessus | Scientific Linux Security Update : seamonkey on SL3.x, SL4.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
Binary data 5659.prm
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo