Page 17 of 90 results (0.004 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

Mozilla 1.0 allows remote attackers to steal cookies from other domains via a javascript: URL with a leading "//" and ending in a newline, which causes the host/path check to fail. • https://www.exploit-db.com/exploits/21638 http://bugzilla.mozilla.org/show_bug.cgi?id=152725 http://cert.uni-stuttgart.de/archive/bugtraq/2002/09/msg00230.html http://seclists.org/bugtraq/2002/Jul/0260.html http://www.iss.net/security_center/static/9656.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:074 http://www.mozilla.org/releases/mozilla1.0.1/security-fixes-1.0.1.html http://www.securityfocus.com/bid/5293 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Heap-based buffer overflow in Netscape 6.2.3 and Mozilla 1.0 and earlier allows remote attackers to crash client browsers and execute arbitrary code via a PNG image with large width and height values and an 8-bit or 16-bit alpha channel. • http://bugzilla.mozilla.org/show_bug.cgi?id=157202 http://www.iss.net/security_center/static/9287.php http://www.mandriva.com/security/advisories?name=MDKSA-2002:074 http://www.mozilla.org/releases/mozilla1.0.1/security-fixes-1.0.1.html •

CVSS: 5.0EPSS: 4%CPEs: 36EXPL: 2

The POP3 mail client in Mozilla 1.0 and earlier, and Netscape Communicator 4.7 and earlier, allows remote attackers to cause a denial of service (no new mail) via a mail message containing a dot (.) at a newline, which is interpreted as the end of the message. • https://www.exploit-db.com/exploits/21539 http://bugzilla.mozilla.org/show_bug.cgi?id=144228 http://mozilla.org/releases/mozilla1.0.1/security-fixes-1.0.1.html http://online.securityfocus.com/archive/1/276628 http://www.iss.net/security_center/static/9343.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:074 http://www.securityfocus.com/archive/1/276946 http://www.securityfocus.com/bid/5002 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 2

Cross-site scripting (XSS) vulnerability in the FTP view feature in Mozilla 1.0 allows remote attackers to inject arbitrary web script or HTML via the title tag of an ftp URL. • https://www.exploit-db.com/exploits/21682 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0060.html http://bugzilla.mozilla.org/show_bug.cgi?id=154030 http://www.iss.net/security_center/static/9757.php http://www.securityfocus.com/bid/5403 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 8%CPEs: 12EXPL: 0

Heap-based buffer overflow in Netscape and Mozilla allows remote attackers to execute arbitrary code via a jar: URL that references a malformed .jar file, which overflows a buffer during decompression. Desbordamiento de búfer basado en el montículo (heap) en Netscape y Mozilla permite a atacantes remotos ejecutar código arbitrario mediante una URL de tipo jar: que referencia a un fichero .jar malformado, lo que desborda un búfer durante la descompresión. • http://bugzilla.mozilla.org/show_bug.cgi?id=157646 http://marc.info/?l=bugtraq&m=103730181813075&w=2 http://www.redhat.com/support/errata/RHSA-2003-162.html http://www.redhat.com/support/errata/RHSA-2003-163.html http://www.securityfocus.com/bid/6185 https://exchange.xforce.ibmcloud.com/vulnerabilities/10636 https://access.redhat.com/security/cve/CVE-2002-1308 https://bugzilla.redhat.com/show_bug.cgi?id=1616870 •