Page 100 of 692 results (0.030 seconds)

CVSS: 9.3EPSS: 14%CPEs: 202EXPL: 4

The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c; and other vectors. El motor JavaScript en Mozilla Firefox anterior a v3.0.11, Thunderbird anterior a v2.0.0.22, y SeaMonkey anteriores a v1.1.17 permite a atacantes remotos producir una denegación de servicio (corrupción de memoria y caída de aplicación) o posiblemente ejecutar codigo arbitrario a traves de vectores relacionados con (1) js_LeaveSharpObject, (2) ParseXMLSource, y (3) una cierta aserción en jsinterp.c; y otros vectores. • http://osvdb.org/55152 http://osvdb.org/55153 http://osvdb.org/55154 http://rhn.redhat.com/errata/RHSA-2009-1096.html http://secunia.com/advisories/35331 http://secunia.com/advisories/35415 http://secunia.com/advisories/35428 http://secunia.com/advisories/35431 http://secunia.com/advisories/35439 http://secunia.com/advisories/35440 http://secunia.com/advisories/35468 http://secunia.com/advisories/35536 http://secunia.com/advisories/35561 http://secunia.com/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 11%CPEs: 132EXPL: 2

Visual truncation vulnerability in netwerk/dns/src/nsIDNService.cpp in Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 allows remote attackers to spoof the location bar via an IDN with invalid Unicode characters that are displayed as whitespace, as demonstrated by the \u115A through \u115E characters. Vulnerabilidad de truncado visual en netwerk/dns/src/nsIDNService.cpp en Mozilla Firefox anterior a v3.0.11 y SeaMonkey anterior a v1.1.17 permite a atacantes remotos sustituir la barra de direcciones a través de un IDN con caracteres Unicode inválidos que son mostrados como espacios en blanco, como se demostró en los caracteres desde \u115A hasta \u115E. • https://www.exploit-db.com/exploits/33039 http://osvdb.org/55162 http://secunia.com/advisories/35331 http://secunia.com/advisories/35415 http://secunia.com/advisories/35431 http://secunia.com/advisories/35439 http://secunia.com/advisories/35468 http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 http://www.debian.org/security/2009/dsa-1820 http://www.mozilla.or • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 132EXPL: 2

Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning. Mozilla Firefox anteriores a v3.0.11 y SeaMonkey anteriores a v1.1.17 asocian documentos locales con un dominio de nombres externo localizado después de la subcadena "file://" en una URL, lo que permite a atacantes remotos ayudados por el usuario leer cookies de forma arbitraria a través de un documento HTML manipulado, como se demostró mediante una URL con file://examplo.com/C:/ al principio. • http://osvdb.org/55161 http://rhn.redhat.com/errata/RHSA-2009-1096.html http://secunia.com/advisories/35331 http://secunia.com/advisories/35415 http://secunia.com/advisories/35428 http://secunia.com/advisories/35431 http://secunia.com/advisories/35439 http://secunia.com/advisories/35468 http://secunia.com/advisories/35561 http://secunia.com/advisories/35882 http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 http://slackware.com&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 1%CPEs: 202EXPL: 2

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack. Mozilla Firefox anteriores a v3.0.11, Thunderbird anteriores a v2.0.0.22, y SeaMonkey anteriores a v1.1.17 utilizan la cabecera HTTP del servidor para determinar el contexto de un documento facilitado mediante una respuesta CONNECT no 200 desde un servidor proxy, lo que permite a atacantes "man-in-the-middle" ejecutar secuencias de comandos web arbitrarios mediante la modificación de la respuesta CONNECT, también conocido como ataque "forzado SSL". • http://osvdb.org/55160 http://research.microsoft.com/apps/pubs/default.aspx?id=79323 http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf http://secunia.com/advisories/35331 http://secunia.com/advisories/35415 http://secunia.com/advisories/35431 http://secunia.com/advisories/35439 http://secunia.com/advisories/35440 http://secunia.com/advisories/35468 http://secunia.com/advisories/35536 http://secunia.com/advisories/35561 http://secunia.com/advisories/35602 • CWE-287: Improper Authentication •

CVSS: 9.3EPSS: 92%CPEs: 112EXPL: 11

The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames and ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, related to the atom table, DOM mutation events, and Unicode surrogates; (8) nsHTMLEditor::HideResizers; and (9) nsWindow::SetCursor, related to changing the cursor; and other vectors. El motor del navegador en Mozilla Firefox v3 anteriores a v3.0.11, Thunderbird anteriores a 2.0.0.22, y SeaMonkey anteriores a 1.1.17 permite a atacantes remotos producir una denegación de servicio (corrupción de memoria y caída de aplicación) o posiblemente ejecutar código arbitrario a través de vectores relacionados con (1) nsEventStateManager::GetContentState y nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames y ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, relacionado con la tabla atom, eventos de mutacion DOM, y subrrogados Unicode; (8) nsHTMLEditor::HideResizers; y (9) nsWindow::SetCursor, relacionado con el cambio de cursor; y otros vectores. • http://osvdb.org/55144 http://osvdb.org/55145 http://osvdb.org/55146 http://osvdb.org/55147 http://rhn.redhat.com/errata/RHSA-2009-1096.html http://secunia.com/advisories/35331 http://secunia.com/advisories/35415 http://secunia.com/advisories/35428 http://secunia.com/advisories/35431 http://secunia.com/advisories/35439 http://secunia.com/advisories/35440 http://secunia.com/advisories/35468 http://secunia.com/advisories/35536 http://secunia.com/advisories/3 • CWE-94: Improper Control of Generation of Code ('Code Injection') •