Page 4 of 89 results (0.007 seconds)

CVSS: 5.3EPSS: 1%CPEs: 31EXPL: 0

28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 does not restrict xsl:include and xsl:import tags in XSLT stylesheets to the current domain, which allows remote attackers to determine the existence of files on the local system. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •

CVSS: 7.5EPSS: 1%CPEs: 44EXPL: 0

28 Feb 2005 — The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname. • http://secunia.com/advisories/19823 •

CVSS: 9.8EPSS: 3%CPEs: 31EXPL: 0

28 Feb 2005 — Heap-based buffer overflow in the UTF8ToNewUnicode function for Firefox before 1.0.1 and Mozilla before 1.7.6 might allow remote attackers to cause a denial of service (crash) or execute arbitrary code via invalid sequences in a UTF8 encoded string that result in a zero length value. • http://secunia.com/advisories/19823 •

CVSS: 5.3EPSS: 1%CPEs: 31EXPL: 0

28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •

CVSS: 5.5EPSS: 0%CPEs: 31EXPL: 0

27 Feb 2005 — Firefox before 1.0.1 and Mozilla Suite before 1.7.6 use a predictable filename for the plugin temporary directory, which allows local users to delete arbitrary files of other users via a symlink attack on the plugtmp directory. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •

CVSS: 7.5EPSS: 8%CPEs: 6EXPL: 7

07 Feb 2005 — The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 3

07 Feb 2005 — The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

06 Feb 2005 — Mozilla 1.6 and possibly other versions allows remote attackers to cause a denial of service (application crash) via a XBM (X BitMap) file with a large (1) height or (2) width value. • http://marc.info/?l=bugtraq&m=110512665029209&w=2 •

CVSS: 9.1EPSS: 0%CPEs: 10EXPL: 0

29 Jan 2005 — Firefox before 1.0 and Mozilla before 1.7.5 allow remote attackers to load local files via links "with a custom getter and toString method" that are middle-clicked by the user to be opened in a new tab. • http://www.mozilla.org/security/announce/mfsa2005-01.html •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

29 Jan 2005 — Firefox 0.9, Thunderbird 0.6 and other versions before 0.9, and Mozilla 1.7 before 1.7.5 save temporary files with world-readable permissions, which allows local users to read certain web content or attachments that belong to other users, e.g. content that is managed by helper applications such as PDF. • http://secunia.com/advisories/19823 •