Page 101 of 1317 results (0.020 seconds)

CVSS: 9.8EPSS: 75%CPEs: 3EXPL: 1

21 Dec 2011 — The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements. La implementación de SVG en Mozilla Firefox v8.0, Thunderbird v8.0, y SeaMonkey v2.6, no interactua correctamente con los manejadores de eventos DOMAttrModified, lo que permite a atacantes... • https://www.exploit-db.com/exploits/18847 • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 3%CPEs: 100EXPL: 0

21 Dec 2011 — Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors. Múltiples vulnerabilidades no especificadas en en motor de navegación de Mozilla Firefox antes de v8.0... • http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html •

CVSS: 8.1EPSS: 0%CPEs: 226EXPL: 0

21 Dec 2011 — Mozilla Firefox before 3.6.25 and Thunderbird before 3.1.17 on Mac OS X do not consider .jar files to be executable files, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted file. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-2372 on Mac OS X. Mozilla Firefox antes de v3.6.25 y Thunderbird antes de v3.1.17 en Mac OS X no consideran los archivos .jar como ejecutables, lo que permite a atacantes remotos asistidos por el usurio evitar las... • http://www.mozilla.org/security/announce/2011/mfsa2011-59.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.3EPSS: 0%CPEs: 150EXPL: 1

07 Dec 2011 — The JavaScript implementation in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method. La ejecución de JavaScript en Mozilla Firefox antes de v4.0, Thunderbird antes de v3.3 y SeaMonkey antes de v2.1, no restringen adecuadamente el conjunto de valores contenidos en el ... • http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 150EXPL: 1

07 Dec 2011 — The Cascading Style Sheets (CSS) implementation in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document, a related issue to CVE-2010-2264. La implementación de las Hojas de Estilo en Cascada (CSS) enen Mozilla Firefox antes de v4.0, Thunderbird antes de v3.3 y SeaMonkey antes de v2.1, no controla correctamente el :visite... • http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 150EXPL: 0

07 Dec 2011 — The layout engine in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 executes different code for visited and unvisited links during the processing of Cascading Style Sheets (CSS) token sequences, which makes it easier for remote attackers to obtain sensitive information about visited web pages via a timing attack. El motor de diseño en Mozilla Firefox antes de v4.0, Thunderbird antes de v3.3 y SeaMonkey antes de v2.1, ejecuta código diferente para los enlaces visitados y no visi... • http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 222EXPL: 0

09 Nov 2011 — Mozilla Firefox before 8.0 and Thunderbird before 8.0 on Mac OS X do not properly interact with the GPU memory behavior of a certain driver for Intel integrated GPUs, which allows remote attackers to bypass the Same Origin Policy and read image data via vectors related to WebGL textures. Mozilla Firefox en versiones anteriores a la 8.0 y Thunderbird anteriores a la 8.0 en Mac OS X no interactúan apropiadamente con el comportamiento de memoria GPU de determinados controladores de GPUs integradas Intel, lo qu... • http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 240EXPL: 0

09 Nov 2011 — Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Mozilla Firefox en versiones anteriores a 3.6.24 y versiones 4.x hasta la 7.0 y Thunderbird en versiones anteriores a 3.1.6 y 5.0 hasta la 7.0 permite a atacantes remotos inyectar codigo de scrip... • http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

09 Nov 2011 — Mozilla Firefox 7.0 and Thunderbird 7.0, when the Direct2D (aka D2D) API is used on Windows in conjunction with the Azure graphics back-end, allow remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas. NOTE: this issue exists because of a CVE-2011-2986 regression. Mozilla Firefox 7.0 y Thunderbird 7.0, cuando se utiliza el API Direct2D (D2D) en Windows junto con el back-end de gráficos Azure, permite a atacantes remot... • http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 1%CPEs: 25EXPL: 0

09 Nov 2011 — Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site. Mozilla Firefox 4.x hasta la 7.0 y Thunderbird 5.0 hasta la 7.0 realizan el control de acceso sin comprobar el uso del "wrapper" NoWaiverWrapper, lo que permite a atacantes remotos escalar privilegios a través de un sitio web modificado. • http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •