This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Mozilla First view 2004-08-06
Product Thunderbird Last view 2021-03-31
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:mozilla:thunderbird:1.5:-:*:*:*:*:*:* 874
cpe:2.3:a:mozilla:thunderbird:0.7:-:*:*:*:*:*:* 862
cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:* 861
cpe:2.3:a:mozilla:thunderbird:1.0:-:*:*:*:*:*:* 861
cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:* 858
cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:* 857
cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:* 856
cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:* 856
cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:* 856
cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:* 855
cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:* 855
cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:* 855
cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:* 855
cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:* 855
cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:* 854
cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:* 854
cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:* 854
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* 853
cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:* 852
cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:* 852
cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:* 850
cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:* 849
cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:* 849
cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:* 847
cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:* 844
cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:* 843
cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:* 842
cpe:2.3:a:mozilla:thunderbird:0.7:rc:*:*:*:*:*:* 842
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:x86:* 842
cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:* 837
cpe:2.3:a:mozilla:thunderbird:1.0:rc:*:*:*:*:*:* 836
cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:* 835
cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:* 829
cpe:2.3:a:mozilla:thunderbird:1.5:beta1:*:*:*:*:*:* 827
cpe:2.3:a:mozilla:thunderbird:1.1:alpha2:*:*:*:*:*:* 827
cpe:2.3:a:mozilla:thunderbird:1.5:rc2:*:*:*:*:*:* 827
cpe:2.3:a:mozilla:thunderbird:1.1:alpha1:*:*:*:*:*:* 827
cpe:2.3:a:mozilla:thunderbird:1.5:rc1:*:*:*:*:*:* 827
cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:* 823
cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:* 820
cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:* 817
cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:* 815
cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:* 811
cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:* 811
cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:* 811
cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:* 811
cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:* 809
cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:* 809
cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:* 808
cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:* 807

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.8 2021-03-31 CVE-2021-23987

Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87.

6.5 2021-03-31 CVE-2021-23984

A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87.

6.5 2021-03-31 CVE-2021-23982

Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87.

8.1 2021-03-31 CVE-2021-23981

A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87.

8.8 2021-02-26 CVE-2021-23978

Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.

6.5 2021-02-26 CVE-2021-23973

When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.

4.3 2021-02-26 CVE-2021-23969

As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that’s not possible, user agents need to strip the URL down to an origin to avoid unintentional leakage." Under certain types of redirects, Firefox incorrectly set the source file to be the destination of the redirects. This was fixed to be the redirect destination's origin. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.

4.3 2021-02-26 CVE-2021-23968

If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in the violation report; as opposed to the original frame URI. This could be used to leak sensitive information contained in such URIs. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.

8.8 2021-02-26 CVE-2021-23964

Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.

8.8 2021-02-26 CVE-2021-23960

Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.

8.8 2021-02-26 CVE-2021-23954

Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.

4.3 2021-02-26 CVE-2021-23953

If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.

8.8 2021-01-07 CVE-2020-35113

Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

8.8 2021-01-07 CVE-2020-35112

If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

4.3 2021-01-07 CVE-2020-35111

When an extension with the proxy permission registered to receive , the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View Source could have inadvertently leaked their IP address. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

6.1 2021-01-07 CVE-2020-26978

Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

8.8 2021-01-07 CVE-2020-26974

When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

8.8 2021-01-07 CVE-2020-26973

Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

8.8 2021-01-07 CVE-2020-26971

Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

8.8 2020-12-09 CVE-2020-26970

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

8.8 2020-12-09 CVE-2020-26968

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

6.5 2020-12-09 CVE-2020-26966

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

6.5 2020-12-09 CVE-2020-26965

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

6.5 2020-12-09 CVE-2020-26961

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

8.8 2020-12-09 CVE-2020-26960

If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
21% (171) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
15% (125) CWE-416 Use After Free
9% (75) CWE-399 Resource Management Errors
7% (57) CWE-20 Improper Input Validation
6% (51) CWE-264 Permissions, Privileges, and Access Controls
6% (49) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
5% (45) CWE-200 Information Exposure
4% (32) CWE-787 Out-of-bounds Write
3% (29) CWE-94 Failure to Control Generation of Code ('Code Injection')
2% (18) CWE-125 Out-of-bounds Read
2% (17) CWE-189 Numeric Errors
1% (11) CWE-190 Integer Overflow or Wraparound
1% (8) CWE-346 Origin Validation Error
1% (8) CWE-269 Improper Privilege Management
1% (8) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (6) CWE-74 Failure to Sanitize Data into a Different Plane ('Injection')
0% (5) CWE-362 Race Condition
0% (5) CWE-352 Cross-Site Request Forgery (CSRF)
0% (5) CWE-326 Inadequate Encryption Strength
0% (5) CWE-17 Code
0% (4) CWE-310 Cryptographic Issues
0% (4) CWE-287 Improper Authentication
0% (4) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (4) CWE-16 Configuration
0% (3) CWE-522 Insufficiently Protected Credentials

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-26 Leveraging Race Conditions
CAPEC-28 Fuzzing
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash
CAPEC-63 Simple Script Injection
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
CAPEC-66 SQL Injection

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:3250 Mozilla, Firefox, Thunderbird POP3 SendUidl Buffer Overflow
oval:org.mitre.oval:def:11042 Heap-based buffer overflow in the SendUidl in the POP3 capability for Mozilla...
oval:org.mitre.oval:def:9240 Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow rem...
oval:org.mitre.oval:def:3603 Mozilla, Firefox, Thunderbird Security Lock Icon Spoof Vulnerability
oval:org.mitre.oval:def:4403 Mozilla, Firefox, Thunderbird XPInstall Security Vulnerability
oval:org.mitre.oval:def:10032 Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow rem...
oval:org.mitre.oval:def:9419 Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow rem...
oval:org.mitre.oval:def:2418 Mozilla, Firefox, Thunderbird User Interface Hijacking Vulnerability
oval:org.mitre.oval:def:11162 The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and...
oval:org.mitre.oval:def:11201 Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Re...
oval:org.mitre.oval:def:10873 Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for ...
oval:org.mitre.oval:def:10952 Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the P...
oval:org.mitre.oval:def:11668 The XPInstall installer in Mozilla Firefox before the Preview Release, Mozill...
oval:org.mitre.oval:def:9745 Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunder...
oval:org.mitre.oval:def:9543 Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to sp...
oval:org.mitre.oval:def:100056 Mozilla Creates World-readable temp Files
oval:org.mitre.oval:def:100048 Mozilla Thunderbird Subject to IE Vulnerabilities via javascript
oval:org.mitre.oval:def:11407 Thunderbird 0.6 through 0.9 and Mozilla 1.7 through 1.7.3 does not obey the n...
oval:org.mitre.oval:def:100047 Mozilla Mail News Cookie Security Bypass Vulnerability
oval:org.mitre.oval:def:9111 The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 bef...
oval:org.mitre.oval:def:100040 Mozilla String Library Memory Overwrite Vulnerability
oval:org.mitre.oval:def:11377 The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 bef...
oval:org.mitre.oval:def:100028 Mozilla GIF Heap Overflow
oval:org.mitre.oval:def:10010 The installation confirmation dialog in Firefox before 1.0.1, Thunderbird bef...
oval:org.mitre.oval:def:100041 Mozilla 'user:pass@host' Spoofing Vulnerability

SAINT Exploits

Description Link
Firefox AttributeChildRemoved Use After Free More info here
Mozilla Firefox document.write and DOM insertion memory corruption More info here
Mozilla Firefox GIF processing buffer overflow More info here
Firefox sensor.dll Insecure Library Loading More info here
Mozilla Firefox onreadystatechange Event Use After Free More info here
Firefox DOMAttrModified nsSVGValue Observer Handling Out-of-bounds Memory Access More info here
Mozilla Firefox QueryInterface method memory corruption More info here
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability More info here
Firefox crypto.generateCRMFRequest command execution More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
77956 Mozilla Multiple Product Large OGG <video> Element Handling Remote DoS
77955 Mozilla Multiple Product for Mac DOM Frame Deletion NULL Dereference Remote C...
77954 Mozilla Multiple Product SVG Animation accessKey Event Handling Disabled Java...
77953 Mozilla Multiple Product DOMAttrModified SVG Element Handling Out-of-bounds M...
77952 Mozilla Multiple Product Multiple Unspecified Remote Memory Corruption
77951 Mozilla Multiple Product YARR Regular Expression Library Javascript Parsing R...
77609 Mozilla Multiple Product CSS Token Sequence Parsing Timing Attack Remote Info...
76955 Mozilla Multiple Product NoWaiverWrappers Internal Privilege Check Weakness R...
76954 Mozilla Multiple Product WebGL GPU Memory Random Image Disclosure
76953 Mozilla Multiple Product Windows D2D Hardware Acceleration Same Origin Policy...
76952 Mozilla Multiple Product Firebug JavaScript File Profiling Remote Memory Corr...
76951 Mozilla Multiple Product Multiple Unspecified Remote Memory Corruption (2011-...
76950 Mozilla Multiple Product Unchecked Allocation Failure Remote Memory Corruption
76949 Mozilla Multiple Product SVG <mpath> Non-SVG Link Remote Memory Corruption
76948 Mozilla Multiple Product Shift-JIS XSS
76947 Mozilla Multiple Product JSSubScriptLoader loadSubScript Method XPCNativeWrap...
75846 Mozilla Multiple Product Use-after-free OGG File Handling Remote Code Execution
75844 Mozilla Multiple Product YARR Unspecified Memory Corruption
75841 Mozilla Multiple Product Enter Key Download Dialog Verification Bypass
75840 Mozilla Multiple Product PLUGINSPAGE Enter Key Addon Installation Verificatio...
75839 Mozilla Multiple Product Multiple Header Handling HTTP Response Splitting Wea...
75838 Mozilla Multiple Product window.location Named Frame Creation Same Origin Pol...
75836 Mozilla Multiple Product Multiple Unspecified Memory Corruption (2011-2997)
75834 Mozilla Multiple Product Multiple Unspecified Memory Corruption (2011-2995)
74595 Mozilla Multiple Products Ogg Reader Unspecified DoS

ExploitDB Exploits

id Description
34363 Firefox toString console.time Privileged Javascript Injection
30474 Firefox 5.0 - 15.0.1 - __exposedProps__ XCS Code Execution
18531 Mozilla Firefox Firefox 4.0.1 Array.reduceRight() Exploit
17974 Mozilla Firefox Array.reduceRight() Integer Overflow Exploit
15342 Firefox Memory Corruption Proof of Concept (Simplified)
15104 MOAUB #25 - Mozilla Firefox CSS font-face Remote Code Execution Vulnerability
14949 MOAUB #9 - Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability
14422 libpng <= 1.4.2 Denial of Service Vulnerability

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-09-18 Name : Debian Security Advisory DSA 2406-1 (icedove - several vulnerabilities)
File : nvt/deb_2406_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2457-2 (iceweasel - several vulnerabilities)
File : nvt/deb_2457_2.nasl
2013-09-18 Name : Debian Security Advisory DSA 2458-2 (iceape - several vulnerabilities)
File : nvt/deb_2458_2.nasl
2013-09-18 Name : Debian Security Advisory DSA 2513-1 (iceape - several vulnerabilities)
File : nvt/deb_2513_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2553-1 (iceweasel - several vulnerabilities)
File : nvt/deb_2553_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities)
File : nvt/deb_2583_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities)
File : nvt/deb_2584_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities)
File : nvt/deb_2588_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox, openSUSE-SU-2012:0760-1 (MozillaFirefox,)
File : nvt/gb_suse_2012_0760_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:0899-1 (MozillaFirefox)
File : nvt/gb_suse_2012_0899_1.nasl
2012-12-13 Name : SuSE Update for MozillaThunderbird openSUSE-SU-2012:0917-1 (MozillaThunderbird)
File : nvt/gb_suse_2012_0917_1.nasl
2012-12-13 Name : SuSE Update for xulrunner openSUSE-SU-2012:0924-1 (xulrunner)
File : nvt/gb_suse_2012_0924_1.nasl
2012-12-13 Name : SuSE Update for seamonkey openSUSE-SU-2012:0935-1 (seamonkey)
File : nvt/gb_suse_2012_0935_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox)
File : nvt/gb_suse_2012_1064_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1345-1 (MozillaFirefox)
File : nvt/gb_suse_2012_1345_1.nasl
2012-12-13 Name : SuSE Update for Mozilla Suite openSUSE-SU-2012:1412-1 (Mozilla Suite)
File : nvt/gb_suse_2012_1412_1.nasl
2012-12-06 Name : Fedora Update for seamonkey FEDORA-2012-18931
File : nvt/gb_fedora_2012_18931_seamonkey_fc16.nasl
2012-12-06 Name : Fedora Update for seamonkey FEDORA-2012-18952
File : nvt/gb_fedora_2012_18952_seamonkey_fc17.nasl
2012-12-04 Name : Ubuntu Update for firefox USN-1638-3
File : nvt/gb_ubuntu_USN_1638_3.nasl
2012-11-26 Name : FreeBSD Ports: firefox
File : nvt/freebsd_firefox72.nasl
2012-11-26 Name : Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows)
File : nvt/gb_mozilla_firefox_esr_mult_vuln01_nov12_win.nasl
2012-11-26 Name : Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X)
File : nvt/gb_mozilla_prdts_mult_vuln01_nov12_macosx.nasl
2012-11-26 Name : Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows)
File : nvt/gb_mozilla_prdts_mult_vuln01_nov12_win.nasl
2012-11-26 Name : Mozilla Firefox Multiple Vulnerabilities-02 November12 (Mac OS X)
File : nvt/gb_mozilla_prdts_mult_vuln02_nov12_macosx.nasl
2012-11-26 Name : Mozilla Firefox Multiple Vulnerabilities-02 November12 (Windows)
File : nvt/gb_mozilla_prdts_mult_vuln02_nov12_win.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0158 Multiple Vulnerabilities in Oracle Java SE
Severity: Category I - VMSKEY: V0061089
2014-A-0113 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0053309
2014-A-0082 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0052487
2014-A-0064 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0050011
2014-A-0043 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0046769
2014-A-0021 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0043921
2014-A-0009 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0043395
2013-A-0233 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0042596
2013-A-0220 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0042380
2013-A-0203 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0041365
2012-A-0189 Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1
Severity: Category I - VMSKEY: V0035032
2011-A-0160 Multiple Vulnerabilities in VMware vCenter Server 4.0 and vCenter Update Mana...
Severity: Category I - VMSKEY: V0030769

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 Mozilla regular expression heap corruption attempt
RuleID : 8443 - Type : BROWSER-FIREFOX - Revision : 15
2014-01-10 Mozilla regular expression heap corruption attempt
RuleID : 8442 - Type : SMTP - Revision : 2
2014-01-10 Mozilla GIF multipacket heap overflow - ANIMEXTS1.0
RuleID : 6503 - Type : WEB-CLIENT - Revision : 9
2014-01-10 Mozilla GIF single packet heap overflow - ANIMEXTS1.0
RuleID : 6502 - Type : FILE-IMAGE - Revision : 15
2020-07-23 Mozilla Firefox ReadableStreamCloseInternal out-of-bounds access attempt
RuleID : 54380 - Type : BROWSER-FIREFOX - Revision : 1
2020-07-23 Mozilla Firefox ReadableStreamCloseInternal out-of-bounds access attempt
RuleID : 54379 - Type : BROWSER-FIREFOX - Revision : 1
2020-05-07 Mozilla Firefox potential use after free attempt
RuleID : 53581 - Type : BROWSER-FIREFOX - Revision : 1
2020-05-07 Mozilla Firefox potential use after free attempt
RuleID : 53580 - Type : BROWSER-FIREFOX - Revision : 1
2020-02-11 Mozilla multiple products SharedWorker MessagePort memory corruption attempt
RuleID : 52569 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-14 IonMonkey MArraySlice buffer overflow attempt
RuleID : 52431 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-14 IonMonkey MArraySlice buffer overflow attempt
RuleID : 52430 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-14 Mozilla Firefox RemotePrompt sandbox escape attempt
RuleID : 52425 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-14 Mozilla Firefox RemotePrompt sandbox escape attempt
RuleID : 52424 - Type : BROWSER-FIREFOX - Revision : 1
2019-12-24 Mutiple products libpng extra row heap overflow attempt
RuleID : 52307 - Type : FILE-IMAGE - Revision : 1
2019-12-24 Mutiple products libpng extra row heap overflow attempt
RuleID : 52306 - Type : FILE-IMAGE - Revision : 1
2019-10-08 Mozilla Firefox Custom Elements write-after-free attempt
RuleID : 51440 - Type : BROWSER-FIREFOX - Revision : 1
2019-10-08 Mozilla Firefox Custom Elements write-after-free attempt
RuleID : 51439 - Type : BROWSER-FIREFOX - Revision : 1
2019-10-08 Mozilla Thunderbird input filter bypass cross site scripting attempt
RuleID : 51405 - Type : SERVER-MAIL - Revision : 1
2019-10-08 Mozilla Firefox GeckoActiveXObject exploit attempt
RuleID : 51394 - Type : BROWSER-OTHER - Revision : 2
2019-10-08 Mozilla Firefox GeckoActiveXObject exploit attempt
RuleID : 51393 - Type : BROWSER-OTHER - Revision : 2
2019-08-13 Mozilla Firefox RemotePrompt sandbox escape attempt
RuleID : 50697 - Type : BROWSER-FIREFOX - Revision : 2
2019-08-13 Mozilla Firefox RemotePrompt sandbox escape attempt
RuleID : 50696 - Type : BROWSER-FIREFOX - Revision : 2
2019-07-31 Mozilla Firefox Array.prototype.pop type confusion attempt
RuleID : 50519 - Type : BROWSER-FIREFOX - Revision : 2
2019-07-31 Mozilla Firefox Array.prototype.pop type confusion attempt
RuleID : 50518 - Type : BROWSER-FIREFOX - Revision : 2
2019-05-24 Mozilla Firefox DOMSVGLength appendItem use after free attempt
RuleID : 49918 - Type : BROWSER-FIREFOX - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-77fe2e20ad.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-def329f680.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1414.nasl - Type: ACT_GATHER_INFO
2018-12-27 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3831.nasl - Type: ACT_GATHER_INFO
2018-12-27 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3833.nasl - Type: ACT_GATHER_INFO
2018-12-18 Name: A web browser installed on the remote macOS host is affected by multiple vuln...
File: macosx_firefox_62_0.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The remote Debian host is missing a security update.
File: debian_DLA-1605.nasl - Type: ACT_GATHER_INFO
2018-12-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4354.nasl - Type: ACT_GATHER_INFO
2018-12-13 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_d10b49b28d0249e8afde0844626317af.nasl - Type: ACT_GATHER_INFO
2018-12-12 Name: A web browser installed on the remote macOS host is affected by multiple vuln...
File: macosx_firefox_60_4_esr.nasl - Type: ACT_GATHER_INFO
2018-12-12 Name: A web browser installed on the remote macOS host is affected by multiple vuln...
File: macosx_firefox_64_0.nasl - Type: ACT_GATHER_INFO
2018-12-12 Name: A web browser installed on the remote Windows host is affected by multiple vu...
File: mozilla_firefox_60_4_esr.nasl - Type: ACT_GATHER_INFO
2018-12-12 Name: A web browser installed on the remote Windows host is affected by multiple vu...
File: mozilla_firefox_64_0.nasl - Type: ACT_GATHER_INFO
2018-12-11 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1384.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2831.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2832.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2885.nasl - Type: ACT_GATHER_INFO
2018-11-26 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201811-13.nasl - Type: ACT_GATHER_INFO
2018-11-21 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3531.nasl - Type: ACT_GATHER_INFO
2018-11-21 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3532.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-1575.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4337.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3403.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201811-04.nasl - Type: ACT_GATHER_INFO
2018-11-08 Name: The remote Debian host is missing a security update.
File: debian_DLA-1571.nasl - Type: ACT_GATHER_INFO