This might be proprietary software.
|2011-03-11||CVE-2011-1187||Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."||Chrome, Firefox, Seamonkey, Thunderbird||N/A|
|2015-05-21||CVE-2015-4000||The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.||Iphone_os, Mac_os_x, Safari, Ubuntu_linux, Debian_linux, Chrome, Hp\-Ux, Content_manager, Ie, Firefox, Firefox_esr, Firefox_os, Network_security_services, Seamonkey, Thunderbird, Openssl, Opera_browser, Jdk, Jre, Jrockit, Sparc\-Opl_service_processor, Linux_enterprise_desktop, Linux_enterprise_server, Linux_enterprise_software_development_kit, Suse_linux_enterprise_server||3.7|
|2007-09-12||CVE-2007-4841||Mozilla Firefox before 220.127.116.11, Thunderbird before 18.104.22.168, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid "%" encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.||Firefox, Seamonkey, Thunderbird||N/A|
|2007-02-26||CVE-2007-0778||The page cache feature in Mozilla Firefox before 22.214.171.124 and 2.x before 126.96.36.199, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache.||Ubuntu_linux, Debian_linux, Firefox, Seamonkey||N/A|
|2007-02-26||CVE-2007-0009||Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 188.8.131.52 and 2.x before 184.108.40.206, Thunderbird before 220.127.116.11, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.||Ubuntu_linux, Debian_linux, Firefox, Network_security_services, Seamonkey, Thunderbird||N/A|
|2006-12-20||CVE-2006-6500||Heap-based buffer overflow in Mozilla Firefox 2.x before 18.104.22.168, 1.5.x before 22.214.171.124, Thunderbird before 126.96.36.199, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by setting the CSS cursor to certain images that cause an incorrect size calculation when converting to a Windows bitmap.||Ubuntu_linux, Debian_linux, Firefox, Seamonkey, Thunderbird||N/A|
|2006-12-20||CVE-2006-6499||The js_dtoa function in Mozilla Firefox 2.x before 188.8.131.52, 1.5.x before 184.108.40.206, Thunderbird before 220.127.116.11, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.||Ubuntu_linux, Debian_linux, Firefox, Seamonkey, Thunderbird||N/A|