SeaMonkey < 2.0.7 Multiple Vulnerabilities. Memory safety issues, integer overflow, dangling pointer, arbitrary code execution, heap buffer overflow, code library load, logical flaw, font crash, JavaScript execution, cross-origin request vulnerability
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Mozilla Thunderbird 3.0.x < 3.0.7 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
![]() | Mozilla Thunderbird < 3.1.3 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
![]() | SeaMonkey < 2.0.7 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
![]() | Mozilla Firefox 3.5.x < 3.5.12 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
![]() | Firefox 3.5.x < 3.5.12 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
![]() | Firefox 3.6.x < 3.6.9 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
![]() | Mozilla Firefox 3.6.x < 3.6.9 Multiple Vulnerabilities | 8 Sep 201000:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : mozilla-thunderbird (MDVSA-2010:169) | 3 Sep 201000:00 | – | nessus |
![]() | Scientific Linux Security Update : seamonkey on SL3.x, SL4.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | openSUSE Security Update : MozillaThunderbird (openSUSE-SU-2010:0430-2) | 13 Jun 201400:00 | – | nessus |
Binary data 5660.prm
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo