Page 163 of 2526 results (0.019 seconds)

CVSS: 7.8EPSS: 0%CPEs: 22EXPL: 0

03 Apr 2013 — Buffer overflow in the Mozilla Maintenance Service in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, and Thunderbird ESR 17.x before 17.0.5 on Windows allows local users to gain privileges via crafted arguments. Desbordamiento de búfer en Mozilla Maintenance Service en Mozilla Firefox anterior a v20.0, Firefox ESR v17.x anterior a v17.0.5, Thunderbird ESR v17.x antes de v17.0.5 en Windows permite que usuarios locales ganar privilegios a través de argumentos manipulad... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 12%CPEs: 138EXPL: 0

03 Apr 2013 — Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors. Múltiples vulnerabilidades sin especificar en el motor de búsqueda de Mozilla Firefox anterior a v20.0 y SeaMonkey anterior a v2.17 permite a atacantes remot... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html •

CVSS: 6.1EPSS: 0%CPEs: 153EXPL: 0

03 Apr 2013 — Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing. Mozilla Firefox antes de 20.0, Firefox ESR v17.x antes v17.0.5, Thunderbird antes de 17.0.5, Thunderbird ESR v17.x antes de v17.0.5 y SeaMonkey ... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.1EPSS: 1%CPEs: 138EXPL: 0

03 Apr 2013 — Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image. Mozilla Firefox anterior a v20.0 y SeaMonkey antes de v2.17, cuando se utiliza gfx.color_management.enablev4, no tratan correctamente los perfiles de color durante el procesamiento PNG, que permi... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 6%CPEs: 180EXPL: 0

03 Apr 2013 — Unspecified vulnerability in the browser engine in Mozilla Firefox before 20.0 on Android allows remote attackers to cause a denial of service (stack memory corruption and application crash) or possibly execute arbitrary code via unknown vectors involving a plug-in. Vulnerabilidad no especificada en el motor del navegador de Mozilla Firefox anterior a v20.0 en Android permite a atacantes remotos causar una denegación de servicios (corrupción de pila de memoria y caída de la aplicación) o posiblemente ejecut... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html •

CVSS: 10.0EPSS: 1%CPEs: 153EXPL: 0

03 Apr 2013 — The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site. El System Only Wrapper (SOW) implementado en la aplicación Mozilla Firefox antes de... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 13%CPEs: 153EXPL: 0

03 Apr 2013 — Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. Múltiples vulnerabilidades sin especificar en el motor de navegación de Mozilla Firefox anterior a 20.0, Firefox ESR 17.x anterior a 17.0.5, Thunderbi... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html •

CVSS: 7.1EPSS: 0%CPEs: 4EXPL: 0

03 Apr 2013 — Mozilla Firefox before 20.0 on Android uses world-writable and world-readable permissions for the app_tmp installation directory in the local filesystem, which allows attackers to modify add-ons before installation via an application that leverages the time window during which app_tmp is used. Mozilla Firefox antes de v20.0 en Android usa permisos de escritura y lectura globales para el la carpeta de instalación app_tmp en el sistema de ficheros local, lo que permite a los atacantes modificar complementos a... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.3EPSS: 0%CPEs: 153EXPL: 0

03 Apr 2013 — Untrusted search path vulnerability in the Mozilla Updater in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allows local users to gain privileges via a Trojan horse DLL file in an unspecified directory. Vulnerabilidad de path de búsqueda no confiable en Mozilla Updater en Mozilla Firefox antes de v20.0, Firefox ESR v17.x antes de v17.0.5, Thunderbird anterior v17.0.5, Thunderbird ESR v17.x anterior v17.0.... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html •

CVSS: 5.9EPSS: 0%CPEs: 34EXPL: 0

14 Mar 2013 — The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. El algoritmo RC4, tal como se usa en el protocolo TLS y protocolo SSL, tiene muchos "single-byte biases", lo que hace que sea más fácil para atacantes remotos realizar ataques de recuperación de texto claro a través de análisis estadístico... • http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html • CWE-326: Inadequate Encryption Strength •