Page 4 of 57 results (0.004 seconds)

CVSS: 5.3EPSS: 1%CPEs: 31EXPL: 0

28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site. The Mozilla Suite is vulnerable to multiple issu... • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •

CVSS: 5.5EPSS: 0%CPEs: 31EXPL: 0

27 Feb 2005 — Firefox before 1.0.1 and Mozilla Suite before 1.7.6 use a predictable filename for the plugin temporary directory, which allows local users to delete arbitrary files of other users via a symlink attack on the plugtmp directory. The Mozilla Suite is vulnerable to multiple issues ranging from the remote execution of arbitrary code to various issues allowing to trick the user into trusting fake web sites or interacting with privileged content. Versions less than 1.7.6 are affected. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •

CVSS: 7.5EPSS: 8%CPEs: 6EXPL: 7

07 Feb 2005 — The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks. The Mozilla Suite is vulnerable to multiple issues ranging from the remote execution of arbitrary code to various issues allowing to trick the user into trusting fake web sites or int... • http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 3

07 Feb 2005 — The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

06 Feb 2005 — Mozilla 1.6 and possibly other versions allows remote attackers to cause a denial of service (application crash) via a XBM (X BitMap) file with a large (1) height or (2) width value. • http://marc.info/?l=bugtraq&m=110512665029209&w=2 •

CVSS: 9.1EPSS: 0%CPEs: 62EXPL: 0

29 Jan 2005 — Firefox before 1.0 and Mozilla before 1.7.5 display the SSL lock icon when an insecure page loads a binary file from a trusted site, which could facilitate phishing attacks. • http://www.mozilla.org/security/announce/mfsa2005-03.html •

CVSS: 8.1EPSS: 0%CPEs: 43EXPL: 0

31 Dec 2004 — Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7 allows remote attackers to determine the location of files on a user's hard drive by obscuring a file upload control and tricking the user into dragging text into that control. • http://bugzilla.mozilla.org/show_bug.cgi?id=206859#c0 •

CVSS: 6.5EPSS: 4%CPEs: 22EXPL: 2

29 Dec 2004 — Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated. A potential security vulnerability has been identified with HP-UX running Mozilla, where a heap overflow could be exploited to allow a remote, unauthorized user to execute privileged code. • http://isec.pl/vulnerabilities/isec-0020-mozilla.txt •

CVSS: 6.5EPSS: 1%CPEs: 53EXPL: 0

10 Dec 2004 — Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability. The Mozilla Suite is vulnerable to multiple issues ranging from the remote execution of arbitrary code to various issues allowing to trick the user into trusting fake web sites or interacting wit... • http://secunia.com/advisories/13129 •

CVSS: 7.5EPSS: 13%CPEs: 30EXPL: 2

20 Oct 2004 — Firefox before 1.0 and Mozilla before 1.7.5 allow inactive (background) tabs to focus on input being entered in the active tab, as originally reported using form fields, which allows remote attackers to steal sensitive data that is intended for other sites, which could facilitate phishing attacks. • https://www.exploit-db.com/exploits/589 •