The host is installed with Mozilla Firefox before 3.6.25 or Thunderbird before 3.1.17 and is prone to multiple information disclosure vulnerabilities. The flaws are present in the applications, which fail to handle a crafted .jar files. Successful exploitation could allow remote attackers to execute arbitrary code.
The host is installed with Mozilla Firefox 8.0 or Thunderbird 8.0 or SeaMonkey 2.5 and is prone to multiple denial of service vulnerabilities. The flaws are present in the applications, which fail to handle DOMAttrModified event handler. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.
The host is installed with Mozilla Firefox 4.x through 8.0 or Thunderbird 5.0 through 8.0 or SeaMonkey before 2.6 and is prone to multiple denial of service vulnerabilities. The flaws are present in the applications, which fail to handle scaling of an OGG <video> element to extreme sizes. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.
The host is installed with Mozilla Firefox 4.x through 8.0 or Thunderbird 5.0 through 8.0 or SeaMonkey before 2.6 and is prone to multiple information disclosure vulnerabilities. The flaws are present in the applications, which fail to handle SVG animation accessKey events. Successful exploitation could allow remote attackers to capture keystrokes entered on a web page and act as intermediate betw ...
The host is installed with Mozilla Firefox 4.x through 8.0 or Thunderbird 5.0 through 8.0 or SeaMonkey before 2.6 and is prone to multiple denial of service vulnerabilities. The flaws are present in the applications, which fail to handle YARR regular expression library that could be triggered by javascript in web content. Successful exploitation could allow remote attackers to execute arbitrary co ...
The host is installed with Mozilla Firefox 4.x through 8.0 or Thunderbird 5.0 through 8.0 or SeaMonkey before 2.6 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle memory safety issues. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.
The host is installed with Mozilla Firefox before 47.0 or Firefox ESR 48.x before 48.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fail to handle unknown vectors. Successful exploitation allows remote attackers to use Mozilla Windows updater and overwrite arbitrary files.
The host is installed with Mozilla Firefox 8.0.1 or earlier and is prone to information disclosure vulnerability. A flaw is present in an application, which does not prevent capture of data about the times of Same Origin Policy violations during IFRAME loading attempts. Successful exploitation allows remote attackers to determine whether a document exists in the browser cache via crafted JavaScrip ...
The host is installed with Mozilla Firefox before 45.0 and is prone to a denial of service vulnerability. A flaw is present in the ServiceWorkerManager class in Mozilla Firefox, which fails to handle unspecified use of the Clients API. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption).
The host is installed with Mozilla Firefox before 45.0 and is prone to an integer underflow vulnerability. A flaw is present in the FileReader class in Mozilla Firefox, which fails to handle FileReader API while changing a file during a read operation. Successful exploitation allows local users to gain privileges or cause a denial of service (memory corruption).