Page 159 of 2526 results (0.024 seconds)

CVSS: 10.0EPSS: 5%CPEs: 154EXPL: 0

07 Aug 2013 — Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request. Desbordamiento de búfer basado en memoria dinámica en la función cryptojs_interpret_key_gen_type en Mozilla Firefox anterior a v23.0 y SeaMonkey anterior a v2.20 permite a atacantes remotos ejecutar código arbitrari... • http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.1EPSS: 0%CPEs: 178EXPL: 0

07 Aug 2013 — The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors. La implementación Web Workers en Mozilla Firefox anterior a v23.0, Firefox ESR v17.x anterior a v 17.0.8, Thunderbird anterior a v 17.0.8, Thund... • http://www.debian.org/security/2013/dsa-2735 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 91%CPEs: 178EXPL: 3

07 Aug 2013 — The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation. La función crypto.generateCRMFRequest en Mozilla Firefox anterior a v23.0, Firefox ESR v17.x anterior a v 17.0.8, Thunderbird a... • https://packetstorm.news/files/id/124564 • CWE-20: Improper Input Validation CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 154EXPL: 0

07 Aug 2013 — Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function. Mozilla Firefox anterior a v23.0 y SeaMonkey anterior a v2.20 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un archivo WAV manipulado que no es manejado correctamente por la función nsCString::CharAt. USN-1924-1 fixed vulnerabilities in Firefox. T... • http://www.mozilla.org/security/announce/2013/mfsa2013-67.html •

CVSS: 6.1EPSS: 0%CPEs: 178EXPL: 0

07 Aug 2013 — Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document. Mozilla Firefox anterior a v23.0, Firefox ESR v17.x anterior a v 17.0.8, Thunderbird anterior a v 17.0.8, Thunderbird ESR v17.... • http://www.debian.org/security/2013/dsa-2735 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

26 Jun 2013 — Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element. Mozilla Firefox antes de v22.0 no implementea correctamente cierto comportamiento DocShell para el atributo sandbox de un elemento IFRAME, lo que permite a atacantes remotos burlar las restricciones de acceso a través de un elemento FRAME dentro de un ele... • http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.3EPSS: 0%CPEs: 7EXPL: 0

26 Jun 2013 — The Mozilla Maintenance Service in Mozilla Firefox before 22.0 on Windows does not properly handle inability to launch the Mozilla Updater executable file, which allows local users to gain privileges via vectors involving placement of a Trojan horse executable file at an arbitrary location. El Mozilla Maintenance Service en Mozilla Firefox anterior a 22.0 sobre Windows no maneja adecuadamente la incapacidad para ejecutar el archivo ejecutable "Mozilla Updater", lo que permite a usuarios locales elevar sus p... • http://www.mozilla.org/security/announce/2013/mfsa2013-62.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

26 Jun 2013 — The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .com, .name, and .net top-level domains, which allows remote attackers to spoof the address bar via unspecified homograph characters. El algoritmo de presentación Internationalized Domain Name (IDN) en Mozilla Firefox anterior a 22.0 no maneja adecuadamente los dominios de primer nivel .com, .name, y .net, lo que permite a atacantes remotos suplantar la información en la barra de dirección a... • http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html • CWE-310: Cryptographic Issues •

CVSS: 9.8EPSS: 1%CPEs: 6EXPL: 0

26 Jun 2013 — The Profiler implementation in Mozilla Firefox before 22.0 parses untrusted data during UI rendering, which allows user-assisted remote attackers to execute arbitrary JavaScript code via a crafted web site. La implementación Profiler en Mozilla Firefox anterior a v22.0 analiza los datos no confiables en la interfaz de representación de usuario que permite a atacantes remotos asistidos por el usuario ejecutar código JavaScript arbitrario a través de un sitio web manipulado. Multiple memory safety issues were... • http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

26 Jun 2013 — Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses. Mozilla Firefox anterior a v22.0 no fuerza correctamente el mecanismo de protección X-Frame-Options, lo que permite a atacantes remotos llevar a cabo ataques de clickjacking a través de sitio web manipulado que use la característica push del servidor HTTP con respue... • http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html • CWE-264: Permissions, Privileges, and Access Controls •