Page 217 of 2526 results (0.012 seconds)

CVSS: 5.3EPSS: 0%CPEs: 98EXPL: 0

04 Feb 2009 — Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism. Mozilla Firefox anterior a v3.06 y SeaMonkey anterior a v1.1.15 no restringe adecuadamente el acceso desde las páginas web a las cabeceras de respuesta HTTP (1) Set-Cookie y (2) Set-Cookie2, lo qu... • http://ha.ckers.org/blog/20070511/bluehat-errata • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 3%CPEs: 1EXPL: 1

22 Jan 2009 — Mozilla Firefox 3.0.5 allows remote attackers to trick a user into visiting an arbitrary URL via an onclick action that moves a crafted element to the current mouse position, related to a "Status Bar Obfuscation" and "Clickjacking" attack. Mozilla Firefox v3.0.5 permite a atacantes remotos inducir a un usuario a visitar una URL de su elección a través de una acción onclick que mueve un elemento manipulado a la posición actual del ratón, en relación con un ataque de "Ofuscación de la barra de estado" y "Clic... • https://www.exploit-db.com/exploits/7842 •

CVSS: 8.2EPSS: 0%CPEs: 58EXPL: 0

20 Jan 2009 — The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." La función Math.random en la implementación de JavaScript en Moz... • http://arstechnica.com/news.ars/post/20090113-new-method-of-phishmongering-could-fool-experienced-users.html •

CVSS: 6.5EPSS: 7%CPEs: 9EXPL: 3

08 Jan 2009 — Mozilla Firefox 3.0.5 and earlier 3.0.x versions, when designMode is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a certain (a) replaceChild or (b) removeChild call, followed by a (1) queryCommandValue, (2) queryCommandState, or (3) queryCommandIndeterm call. NOTE: it was later reported that 3.0.6 and 3.0.7 are also affected. Mozilla Firefox versión 3.0.5 y anteriores de 3.0.x, cuando designMode está habilitado, permite a atacantes remoto... • https://www.exploit-db.com/exploits/8091 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

02 Jan 2009 — Memory leak in Libxul, as used in Mozilla Firefox 3.0.5 and other products, allows remote attackers to cause a denial of service (memory consumption and browser hang) via a long CLASS attribute in an HR element in an HTML document. Fugas de memoria en Libxul, como las utilizadas en Mozilla Firefox v3.0.5 y otros productos, permiten a atacantes remotos provocar una denegación de servicio (consumo de memoria y cuelgue del navegador) a través del un atributo CLASS largo en un elemento HR de un documento HTML. • http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 1

24 Dec 2008 — Mozilla Firefox 3.0.5 on Windows Vista allows remote attackers to cause a denial of service (application crash) via JavaScript code with a long string value for the hash property (aka location.hash). NOTE: it was later reported that earlier versions are also affected, and that the impact is CPU consumption and application hang in unspecified circumstances perhaps involving other platforms. Firefox 3.0.5 de Mozilla en Windows Vista permite a atacantes remotos provocar una denegación de servicio (caída de la ... • https://www.exploit-db.com/exploits/7554 • CWE-20: Improper Input Validation •

CVSS: 6.1EPSS: 2%CPEs: 10EXPL: 0

17 Dec 2008 — Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document." Mozilla Firefox 3.x antes de v3.0.5 y 2.x antes de v2.0.0.19, Thunderbird 2.x antes 2.0.0.19 y SeaMonkey 1.x antes de v1.1.14 permite a atacantes remotos evitar la política de mismo origen y llevar a cabo ataques de secuencias de comandos ... • http://secunia.com/advisories/33184 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 4%CPEs: 54EXPL: 0

17 Dec 2008 — The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings. La función loadBindingDocument en Mozilla Firefox 2.x antes de v2.0.0.19, Thunderbird 2.x antes de v2.0.0.19 y SeaMonkey 1.x antes de v1.1.14 no realiza ninguna comprobación de seguridad relacionada con l... • http://secunia.com/advisories/33184 •

CVSS: 6.8EPSS: 1%CPEs: 10EXPL: 0

17 Dec 2008 — Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure." Mozilla Firefox 3.x versiones anteriores a v3.0.5 y 2.x versiones anteriores a v2.0.0.19, Thunderbird 2.x versiones an... • http://secunia.com/advisories/33184 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 4%CPEs: 5EXPL: 0

17 Dec 2008 — The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions. El motor de diseño en Mozilla Firefox 3.x antes de v3.0.5, Thunderbird 2.x antes de v2.0.0.19 y SeaMonkey 1.x antes de v1.1.14 permite a atacantes remotos provocar una denegación de servicio (caída) mediante vectores que disparan... • http://secunia.com/advisories/33188 • CWE-399: Resource Management Errors •