Page 246 of 2526 results (0.011 seconds)

CVSS: 9.1EPSS: 43%CPEs: 2EXPL: 1

13 Jul 2005 — Firefox 1.0.3 and 1.0.4, and Netscape 8.0.2, allows remote attackers to execute arbitrary code by tricking the user into using the "Set As Wallpaper" (in Firefox) or "Set as Background" (in Netscape) context menu on an image URL that is really a javascript: URL with an eval statement, aka "Firewalling." • https://www.exploit-db.com/exploits/1102 •

CVSS: 8.8EPSS: 36%CPEs: 13EXPL: 0

13 Jul 2005 — Firefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL. • http://secunia.com/advisories/16043 •

CVSS: 9.1EPSS: 0%CPEs: 38EXPL: 0

13 Jul 2005 — The browser user interface in Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 does not properly distinguish between user-generated events and untrusted synthetic events, which makes it easier for remote attackers to perform dangerous actions that normally could only be performed manually by the user. • http://bugzilla.mozilla.org/show_bug.cgi?id=289940 •

CVSS: 7.5EPSS: 2%CPEs: 13EXPL: 1

13 Jul 2005 — Firefox before 1.0.5 allows remote attackers to steal sensitive information by opening a malicious link in the Firefox sidebar using the _search target, then injecting script into other pages via a data: URL. • http://secunia.com/advisories/16043 •

CVSS: 7.5EPSS: 0%CPEs: 38EXPL: 0

13 Jul 2005 — Firefox before 1.0.5 and Mozilla before 1.7.9 allows a child frame to call top.focus and other methods in a parent frame, even when the parent is in a different domain, which violates the same origin policy and allows remote attackers to steal sensitive information such as cookies and passwords from web sites whose child frames do not verify that they are in the same domain as their parents. • http://secunia.com/advisories/15549 •

CVSS: 9.8EPSS: 0%CPEs: 38EXPL: 1

13 Jul 2005 — The InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation. • http://secunia.com/advisories/16043 •

CVSS: 9.8EPSS: 60%CPEs: 38EXPL: 4

13 Jul 2005 — Firefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object. • http://secunia.com/advisories/16043 •

CVSS: 7.5EPSS: 7%CPEs: 38EXPL: 1

13 Jul 2005 — Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing"). • http://secunia.com/advisories/16043 •

CVSS: 6.5EPSS: 16%CPEs: 3EXPL: 1

01 Jul 2005 — Mozilla 1.7.8, Firefox 1.0.4, Camino 0.8.4, Netscape 8.0.2, and K-Meleon 0.9, and possibly other products that use the Gecko engine, allow remote attackers to cause a denial of service (application crash) via JavaScript that repeatedly calls an empty function. • http://marc.info/?l=bugtraq&m=112008299210033&w=2 •

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 0

13 Jun 2005 — A regression error in Firefox 1.0.3 and Mozilla 1.7.7 allows remote attackers to inject arbitrary Javascript from one page into the frameset of another site, aka the frame injection spoofing vulnerability, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2004-0718. • http://secunia.com/advisories/15601 •