Page 130 of 1317 results (0.014 seconds)

CVSS: 8.8EPSS: 1%CPEs: 7EXPL: 0

18 Jan 2006 — GUI display truncation vulnerability in Mozilla Thunderbird 1.0.2, 1.0.6, and 1.0.7 allows user-assisted attackers to execute arbitrary code via an attachment with a filename containing a large number of spaces ending with a dangerous extension that is not displayed by Thunderbird, along with an inconsistent Content-Type header, which could be used to trick a user into downloading dangerous content by dragging or saving the attachment. • http://secunia.com/advisories/15907 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.5EPSS: 7%CPEs: 24EXPL: 2

31 Dec 2005 — Mozilla Firefox 1.0.1 and possibly other versions, including Mozilla and Thunderbird, allows remote attackers to spoof the URL in the Status Bar via an A HREF tag that contains a TABLE tag that contains another A tag. • https://www.exploit-db.com/exploits/25221 •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

01 Nov 2005 — The SMTP client in Mozilla Thunderbird 1.0.5 BETA, 1.0.7, and possibly other versions, does not notify users when it cannot establish a secure channel with the server, which allows remote attackers to obtain authentication information without detection via a man-in-the-middle (MITM) attack that bypasses TLS authentication or downgrades CRAM-MD5 authentication to plain authentication. • http://marc.info/?l=bugtraq&m=113028017608146&w=2 •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

17 Aug 2005 — Mozilla Thunderbird 1.0 and Firefox 1.0.6 allows remote attackers to obfuscate URIs via a long URI, which causes the address bar to go blank and could facilitate phishing attacks. • http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1682 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

05 Aug 2005 — run-mozilla.sh in Thunderbird, with debugging enabled, allows local users to create or overwrite arbitrary files via a symlink attack on temporary files. run-mozilla.sh en Thunderbird, con debuggin activado, permite que usuarios locales creen o escriban en ficheros arbitrarios mediante un ataque symlink en ficheros temporales. • http://secunia.com/advisories/19863 •

CVSS: 9.1EPSS: 1%CPEs: 55EXPL: 2

13 Jul 2005 — Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection. • http://secunia.com/advisories/16043 •

CVSS: 8.8EPSS: 88%CPEs: 46EXPL: 0

24 Mar 2005 — Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt •

CVSS: 7.5EPSS: 0%CPEs: 44EXPL: 0

28 Feb 2005 — The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname. • http://secunia.com/advisories/19823 •

CVSS: 9.8EPSS: 1%CPEs: 12EXPL: 0

28 Feb 2005 — String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption. • http://secunia.com/advisories/19823 •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

29 Jan 2005 — Firefox 0.9, Thunderbird 0.6 and other versions before 0.9, and Mozilla 1.7 before 1.7.5 save temporary files with world-readable permissions, which allows local users to read certain web content or attachments that belong to other users, e.g. content that is managed by helper applications such as PDF. • http://secunia.com/advisories/19823 •