Heap-based buffer overflow in Mozilla Firefox, Thunderbird, and SeaMonkey versions before 17.0, and 2.14 allows remote code execution
Reporter | Title | Published | Views | Family All 135 |
---|---|---|---|---|
![]() | Heap overflow | 21 Nov 201212:55 | – | prion |
![]() | CVE-2012-5839 | 21 Nov 201211:00 | – | cvelist |
![]() | CVE-2012-5839 | 21 Nov 201212:55 | – | cve |
![]() | CVE-2012-5839 | 21 Nov 201200:00 | – | ubuntucve |
![]() | [SECURITY] Fedora 16 Update: seamonkey-2.14-1.fc16 | 4 Dec 201204:52 | – | fedora |
![]() | [SECURITY] Fedora 17 Update: seamonkey-2.14-1.fc17 | 4 Dec 201204:58 | – | fedora |
![]() | [SECURITY] Fedora 18 Update: seamonkey-2.14-1.fc18 | 4 Dec 201205:23 | – | fedora |
![]() | Use-after-free and buffer overflow issues found using Address Sanitizer — Mozilla | 20 Nov 201200:00 | – | mozilla |
![]() | Mozilla Firefox Security Advisory (MFSA2012-105) - Linux | 11 Nov 202100:00 | – | openvas |
![]() | Fedora Update for seamonkey FEDORA-2012-18952 | 6 Dec 201200:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo