Total vulnerabilities in the database
Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
Software | From | Fixed in |
---|---|---|
mozilla / thunderbird | 3.1 | 3.1.x |
mozilla / firefox | 3.5 | 3.5.11 |
mozilla / firefox | 3.6 | 3.6.7 |
mozilla / seamonkey | - | 2.0.6 |
mozilla / thunderbird | 3.0 | 3.0.6 |
suse / linux_enterprise_desktop | 11-sp1 | 11-sp1.x |
opensuse / opensuse | 11.1 | 11.1.x |
suse / linux_enterprise_server | 11-sp1 | 11-sp1.x |
opensuse / opensuse | 11.2 | 11.2.x |
opensuse / opensuse | 11.3 | 11.3.x |
suse / linux_enterprise_server | 11 | 11.x |
suse / linux_enterprise_desktop | 11 | 11.x |
suse / linux_enterprise_software_development_kit | 11-sp1 | 11-sp1.x |
suse / linux_enterprise_software_development_kit | 11 | 11.x |