Vulnerabilities > Mozilla > Thunderbird > 0.9

DATE CVE VULNERABILITY TITLE RISK
2006-04-14 CVE-2006-1733 Permissions, Privileges, and Access Controls vulnerability in Mozilla products
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) "by inserting an XBL method into the DOM's document.body prototype chain." This vulnerability also affects Mozilla, SeaMonkey, 1.0 and Mozilla, Suite, 1.7.13 This vulnerabiloity is addressed in the following product releases: Mozilla, Firefox, 1.5 Mozilla, Firefox, 1.0.8 Mozilla, Thunderbird, 1.5 Mozilla, Thunderbird, 1.0.8 Mozilla, SeaMonkey, 1.0 Mozilla, Suite, 1.7.13
network
mozilla CWE-264
6.8
2006-04-14 CVE-2006-1731 Cross-Site Scripting vulnerability in Mozilla products
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
network
mozilla CWE-79
4.3
2006-04-14 CVE-2006-1531 Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, and SeaMonkey before 1.0.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors related to DHTML.
network
low complexity
mozilla debian
7.5
2006-04-14 CVE-2006-1530 Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, and SeaMonkey before 1.0.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors related to DHTML.
network
low complexity
mozilla debian
7.5
2006-02-24 CVE-2006-0884 Improper Input Validation vulnerability in Mozilla Thunderbird
The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
network
mozilla CWE-20
critical
9.3
2005-12-31 CVE-2005-4809 Unspecified vulnerability in Mozilla Firefox, Mozilla and Thunderbird
Mozilla Firefox 1.0.1 and possibly other versions, including Mozilla and Thunderbird, allows remote attackers to spoof the URL in the Status Bar via an A HREF tag that contains a TABLE tag that contains another A tag.
network
low complexity
mozilla
5.0
2005-07-13 CVE-2005-2261 Unspecified vulnerability in Mozilla Firefox, Mozilla and Thunderbird
Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.
network
low complexity
mozilla
7.5
2005-05-02 CVE-2005-0590 Remote vulnerability in Mozilla Firefox, Mozilla and Thunderbird
The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname.
network
low complexity
mozilla
5.0
2005-05-02 CVE-2005-0399 Remote Heap Overflow vulnerability in Mozilla Firefox, Mozilla and Thunderbird
Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size.
network
high complexity
mozilla
5.1
2005-05-02 CVE-2005-0255 Remote vulnerability in Mozilla Firefox, Mozilla and Thunderbird
String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.
network
low complexity
mozilla
5.0