Page 381 of 2521 results (0.017 seconds)

CVSS: 10.0EPSS: 10%CPEs: 251EXPL: 0

Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback. Vulnerabilidad de uso después de liberación (use-after-free) en la función nsSVGPathSegList::ReplaceItem de la implementación del elemento listas SVG en Mozilla Firefox anterior a v3.6.18, Thunderbird anterior a v3.1.11, y SeaMonkey hasta v2.0.14 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o puede que ejecutar código de su elección mediante vectores que incluyen una retrollamada facilitada por el usuario. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing SVG path segment objects. The function nsSVGPathSegList::ReplaceItem() does not account for deletion of the segment object list within a user defined DOMAttrModified EventListener. • http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html http://secunia.com/advisories/45002 http://support.avaya.com/css/P8/documents/100144854 http://support.avaya.com/css/P8/documents/100145333 http://www.debian.org/security/2011/dsa-2268 http://www.debian.org/security/2011/dsa-2269 http://www.debian.org/security/2011/dsa-2273 http://www.mandriva.com/security/advisories?name=MDVSA-2011:111 http://www.mozilla.org/security/announce/2011/mfsa2011-23.html h • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 1%CPEs: 14EXPL: 7

The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server. La funcionalidad de validación de certificados X.509 de Mozilla Firefox 4.0.x hasta la 4.0.1 no implementa apropiadamente las excepciones de seguridad de "single-session", lo que facilita a atacantes remotos asistidos por el usuario falsificar un servidor SSL a través de un certificado no confiable que provoca el cacheo, potencialmente no deseado, de documentos del servidor. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=627552 http://openwall.com/lists/oss-security/2011/05/31/14 http://openwall.com/lists/oss-security/2011/05/31/18 http://openwall.com/lists/oss-security/2011/05/31/4 http://openwall.com/lists/oss-security/2011/05/31/9 http://www.securityfocus.com/bid/48064 https://bugzilla.mozilla.org/show_bug.cgi?id=660749 https://bugzilla.redhat.com/show_bug.cgi?id=709165 https://oval.cisecurity.org/repository/search/def • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 167EXPL: 0

Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, on Mac OS X allows remote attackers to bypass intended access restrictions via unknown vectors. Vulnerabilidad no especificada en el Java Embedding Plugin (JEP) en Mozilla Firefox anterior a v3.5.19 y v3.6.x anterior a v3.6.17, y SeaMonkey anterior a v2.0.14, en Mac OS X permite a atacantes remotos evitar las restricciones de acceso a través de vectores desconocidos. • http://www.mandriva.com/security/advisories?name=MDVSA-2011:079 http://www.mozilla.org/security/announce/2011/mfsa2011-15.html https://bugzilla.mozilla.org/show_bug.cgi?id=634724 https://bugzilla.mozilla.org/show_bug.cgi?id=644682 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14498 •

CVSS: 10.0EPSS: 17%CPEs: 13EXPL: 1

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x before 4.0.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to gfx/layers/d3d10/ReadbackManagerD3D10.cpp and unknown other vectors. Multiples vulnerabilidades no especificadas en el motor del navegador de Mozilla Firefox v4.x anterior a v4.0.1 permite a atacantes remotos causar una denegación de servicio (corrupción de memoria y caída de la aplicación) o posiblemente ejecutar código arbitrario mediante vectores relacionados con fx/layers/d3d10/ReadbackManagerD3D10.cpp y otros vectores desconocidos. • http://www.mozilla.org/security/announce/2011/mfsa2011-12.html https://bugzilla.mozilla.org/show_bug.cgi?id=601102 https://bugzilla.mozilla.org/show_bug.cgi?id=639343 https://bugzilla.mozilla.org/show_bug.cgi?id=639728 https://bugzilla.mozilla.org/show_bug.cgi?id=639885 https://bugzilla.mozilla.org/show_bug.cgi? •

CVSS: 10.0EPSS: 96%CPEs: 164EXPL: 6

Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel. Vulnerabilidad de uso después de la liberación (Use-after-free) en Mozilla Firefox anterior a v3.5.19 y v3.6.x anterior a v3.6.17, y SeaMonkey anterior a v2.0.14, permite a atacantes remotos ejecutar código arbitrario mediante OBJECT's mChannel. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the OnChannelRedirect method. When an OBJECT element has no mChannel assigned, it is possible to call the |OnChannelRedirect| method, setting a nearly arbitrary object as the channel in use. • https://www.exploit-db.com/exploits/18377 https://www.exploit-db.com/exploits/17672 https://www.exploit-db.com/exploits/17650 https://www.exploit-db.com/exploits/17612 http://downloads.avaya.com/css/P8/documents/100144158 http://securityreason.com/securityalert/8326 http://securityreason.com/securityalert/8331 http://securityreason.com/securityalert/8340 http://www.debian.org/security/2011/dsa-2227 http://www.debian.org/security/2011/dsa-2228 http://www.debian.org/security • CWE-399: Resource Management Errors CWE-416: Use After Free •