Page 228 of 1159 results (0.013 seconds)

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

The SMTP client in Mozilla Thunderbird 1.0.5 BETA, 1.0.7, and possibly other versions, does not notify users when it cannot establish a secure channel with the server, which allows remote attackers to obtain authentication information without detection via a man-in-the-middle (MITM) attack that bypasses TLS authentication or downgrades CRAM-MD5 authentication to plain authentication. • http://marc.info/?l=bugtraq&m=113028017608146&w=2 http://marc.info/?l=bugtraq&m=113034421329653&w=2 http://www.securityfocus.com/bid/15106 https://bugzilla.mozilla.org/show_bug.cgi?id=311657 •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 1

Mozilla Thunderbird 1.0 and Firefox 1.0.6 allows remote attackers to obfuscate URIs via a long URI, which causes the address bar to go blank and could facilitate phishing attacks. • http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1682 http://www.securityfocus.com/archive/1/407704 http://www.securityfocus.com/bid/14526 •

CVSS: 7.5EPSS: 4%CPEs: 55EXPL: 2

Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection. • http://secunia.com/advisories/16043 http://secunia.com/advisories/16044 http://secunia.com/advisories/16059 http://secunia.com/advisories/19823 http://www.ciac.org/ciac/bulletins/p-252.shtml http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-46.html http://www.networksecurity.fi/advisories/netscape-multiple-issues.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005& •

CVSS: 5.1EPSS: 92%CPEs: 46EXPL: 0

Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/14654 http://secunia.com/advisories/19823 http://www.ciac.org/ciac/bulletins/p-160.shtml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.kb.cert.org/vuls/id/557948 http://www.mozilla.org/security/announce/mfsa2005-30.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.redhat.com/support/errata/RHSA-2005-323& •

CVSS: 5.0EPSS: 0%CPEs: 44EXPL: 0

The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname. • http://secunia.com/advisories/19823 http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mozilla.org/security/announce/mfsa2005-17.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.redhat.com/support/errata/RHSA-2005-176.html http://www.redhat.com/support/errata/RHSA-2005-384.html http://www.securityfocus.com/bid/12659 https://bugzilla.mozilla.org/show_bug.cgi&# •