Vulnerabilities > Mozilla > Seamonkey > 2.0.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-03-26 | CVE-2010-1125 | Information Exposure vulnerability in Mozilla Firefox and Seamonkey The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method. | 5.8 |
2010-02-18 | CVE-2010-0654 | Information Exposure vulnerability in Mozilla Firefox, Seamonkey and Thunderbird Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document. | 4.3 |
2009-01-20 | CVE-2008-5913 | Information Disclosure vulnerability in Multiple Browser JavaScript Engine 'Math.Random()' Cross Domain The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." network mozilla | 4.9 |