Vulnerability & Exploit Database

Results 01 - 17 of 17 in total
Gentoo Linux: CVE-2011-2993: Mozilla Products: Multiple vulnerabilities
Published: August 18, 2011 | Severity: 9
vulnerability
Explore
SUSE Linux Security Vulnerability: CVE-2011-2993
Published: August 18, 2011 | Severity: 9
vulnerability
Explore
MFSA2011-33 SeaMonkey: Security issues addressed in SeaMonkey "2.3" (CVE-2011-2993)
Published: August 18, 2011 | Severity: 9
vulnerability
Explore
MFSA2011-29: Unsigned scripts can call script inside signed JAR (CVE-2011-2993)
Published: August 16, 2011 | Severity: 9
vulnerability
Explore
Cent OS: CESA-2008:0616: CESA-2008:0616 (thunderbird)
Published: July 24, 2008 | Severity: 4
vulnerability
Explore
RHSA-2008:0569: firefox security update
Published: July 07, 2008 | Severity: 10
vulnerability
Explore
Multiple Mozilla Firefox Vulnerabilities Fixed in version 2.0.0.15
Published: July 07, 2008 | Severity: 10
vulnerability
Explore
RHSA-2008:0547: seamonkey security update
Published: July 07, 2008 | Severity: 10
vulnerability
Explore
Gentoo Linux: CVE-2008-2801: Mozilla products: Multiple vulnerabilities
Published: July 07, 2008 | Severity: 8
vulnerability
Explore
MFSA2008-23 SeaMonkey: Signed JAR tampering (CVE-2008-2801)
Published: July 07, 2008 | Severity: 8
vulnerability
Explore
MFSA2008-23 Firefox: Signed JAR tampering (CVE-2008-2801)
Published: July 07, 2008 | Severity: 8
vulnerability
Explore
Cent OS: CVE-2008-2801: CESA-2008:0569 (firefox)
Published: July 07, 2008 | Severity: 8
vulnerability
Explore
RHSA-2008:0549: firefox security update
Published: July 07, 2008 | Severity: 10
vulnerability
Explore
RHSA-2008:0616: thunderbird security update
Published: July 07, 2008 | Severity: 10
vulnerability
Explore
SUSE Linux Security Vulnerability: CVE-2008-2801
Published: July 07, 2008 | Severity: 8
vulnerability
Explore
Cent OS: CESA-2008:0547: CESA-2008:0547 (seamonkey)
Published: July 02, 2008 | Severity: 4
vulnerability
Explore
Cent OS: CESA-2008:0549: CESA-2008:0549 (firefox)
Published: July 02, 2008 | Severity: 4
vulnerability
Explore