Page 156 of 881 results (0.090 seconds)

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

The nsDocument::SetScriptGlobalObject function in content/base/src/nsDocument.cpp in Mozilla Firefox 3.5.x before 3.5.2, when certain add-ons are enabled, does not properly handle a Link HTTP header, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted web page, related to an incorrect security wrapper. La función nsDocument::SetScriptGlobalObject en content/base/src/nsDocument.cpp en Mozilla Firefox v3.5.x anterior a v3.5.2, cuando ciertos add-ons están activados, no maneja adecuadamente las cabeceras HTTP, lo que permite a atacantes remotos ejecutar JavaScript de su elección con privilegios chrome a través de una página web, relacionado con un paquete (wrapper) de seguridad incorrecto. • http://secunia.com/advisories/36126 http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1 http://www.mozilla.org/security/announce/2009/mfsa2009-46.html http://www.securityfocus.com/bid/35928 http://www.vupen.com/english/advisories/2009/2142 https://bugzilla.mozilla.org/show_bug.cgi?id=498897 https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00198.html https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00261.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 2%CPEs: 103EXPL: 0

libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file. libvorbis anterior a r16182, usado en Mozilla Firefox anterior a v3.0.13 y v3.5.x anterior a v3.5.2 y otros productos, permite a atacantes dependientes de contexto, provocar una denegación de servicio (corrupción de memoria y caída de aplicación) o posiblemente la ejecución de código de su elección a través de un archivo .ogg manipulado. • http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html http://secunia.com/advisories/36126 http://secunia.com/advisories/36230 http://secunia.com/advisories/36263 http://secunia.com/advisories/36463 http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1 http://www.mozilla.org/security/announce/2009/mfsa2009-45.html http://www.securityfocus.com/bid/35927 http://www.securityfocus.com/bid/36018 http://www.vupen.com/english/advisories/2009/2142 http • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 15%CPEs: 11EXPL: 0

The browser engine in Mozilla Firefox 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the TraceRecorder::snapshot function in js/src/jstracer.cpp, and unspecified other vectors. El motor de búsqueda en Mozilla Firefox anteriores v3.0.13 , y v3.5.x anteriores v3.5.2, permite a atacantes remotos causar una denegación de servicio (consumo de memoria y caída de aplicación) o probablemente ejecutar código a su elección a través de vectores relacionados con la función TraceRecorder::snapshot en js/src/jstracer.cpp, y otros vectores no especificados. • http://secunia.com/advisories/36126 http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1 http://www.mozilla.org/security/announce/2009/mfsa2009-45.html http://www.securityfocus.com/bid/35927 http://www.vupen.com/english/advisories/2009/2142 https://bugzilla.mozilla.org/show_bug.cgi?id=502832 https://bugzilla.mozilla.org/show_bug.cgi?id=503144 https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00198.html https://www.redhat.com/archives/fedora-p • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 60%CPEs: 7EXPL: 0

Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function. Desbordamiento de búfer basado en memoria dinámica en el analizador de expresiones regulares en Mozilla NetWork Security Services (NSS) anteriores a 3.12.3 como las utilizadas en Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, y AOL Instant Messenger (AIM), permite a servidores SSL remotos provocar una denegación de servicio (caída de aplicación) o posiblemente ejecución de código de su elección a través de un nombre de dominio largo en el campo Common Name (CN) en un certificado X.509, relativo a la función cert_TestHost_Name. • http://rhn.redhat.com/errata/RHSA-2009-1185.html http://secunia.com/advisories/36088 http://secunia.com/advisories/36102 http://secunia.com/advisories/36125 http://secunia.com/advisories/36139 http://secunia.com/advisories/36157 http://secunia.com/advisories/36434 http://secunia.com/advisories/37098 http://secunia.com/advisories/39428 http://sunsolve.sun.com/search/document.do?assetkey=1-66-273910-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 50%CPEs: 116EXPL: 1

The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsDOMClassInfo.cpp, (2) JS_HashTableRawLookup, and (3) MirrorWrappedNativeParent and js_LockGCThingRT. JavaScript engine en Mozilla Firefox anteriores v3.0.12 y Thunderbird permite a atacantes remotos causar una denegación de servicio (consumo de memoria y caída de aplicación) o posiblemente ejecutar código a su elección a través de vectores relacionados a (1) nsDOMClassInfo.cpp, (2) JS_HashTableRawLookup, y(3) MirrorWrappedNativeParent and js_LockGCThingRT. • http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html http://rhn.redhat.com/errata/RHSA-2009-1162.html http://rhn.redhat.com/errata/RHSA-2009-1163.html http://secunia.com/advisories/35914 http://secunia.com/advisories/35943 http://secunia.com/advisories/35944 http://secunia.com/advisories/35947 http://secunia.com/advisories/36005 http://secunia.com/advisories/36145 http://sunsolve. • CWE-399: Resource Management Errors •