Page 409 of 2337 results (0.023 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in Firefox 3.0 and 2.0.x has unknown impact and attack vectors. NOTE: due to lack of details as of 20080619, it is not clear whether this is the same issue as CVE-2008-2785. A CVE identifier has been assigned for tracking purposes. Desbordamiento de Búfer en Firefox 3.0 y 2.0 tiene un impacto y vectores de ataque desconocidos. NOTA: debido a la ausencia de detalles 20080619, no está claro si es el mismo problema que la CVE-2008-2785. • http://lists.grok.org.uk/pipermail/full-disclosure/2008-June/062832.html http://www.securityfocus.com/bid/29794 https://exchange.xforce.ibmcloud.com/vulnerabilities/43317 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 41%CPEs: 75EXPL: 0

Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349. Firefox anterior a versión 2.0.0.16 y versiones 3.x anteriores a 3.0.1, Thunderbird anterior a versión 2.0.0.16, y SeaMonkey anterior a versión 1.1.11, de Mozilla, utilizan un tipo de datos enteros incorrecto como contador de referencia de objeto CSS en la estructura de datos cssValue (también se conoce como nsCSSValue:Array), que permite a los atacantes remotos ejecutar código arbitrario por medio de un gran número de referencias a un objeto CSS común, conllevando a un desbordamiento de contador y una liberación de memoria en uso, también se conoce como ZDI-CAN-349. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the browser's handling reference counters to the nsCSSValue:Array class. Creating more then 65,535 references will overflow a 16-bit reference counter and therefore result in an erroneous free() while the object still exists. • http://blog.mozilla.com/security/2008/06/18/new-security-issue-under-investigation http://dvlabs.tippingpoint.com/blog/2008/06/18/vulnerability-in-mozilla-firefox-30 http://rhn.redhat.com/errata/RHSA-2008-0616.html http://secunia.com/advisories/30761 http://secunia.com/advisories/31121 http://secunia.com/advisories/31122 http://secunia.com/advisories/31129 http://secunia.com/advisories/31144 http://secunia.com/advisories/31145 http://secunia.com/advisories/31154 http://secuni • CWE-189: Numeric Errors •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 3

Mozilla Firefox 2.0.0.14 allows remote attackers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code by triggering an error condition during certain Iframe operations between a JSframe write and a JSframe close, as demonstrated by an error in loading an empty Java applet defined by a 'src="javascript:"' sequence. Mozilla Firefox 2.0.0.14, permite a atacantes remotos provocar una denegación de servicio (corrupción de montículo y caída de aplicación) o posiblemente ejecute código arbitrario lanzando una condición de error durante ciertas operaciones IFRAME entre la escritura JSframe y el cierre del JSframe, como se demostró por un error cargando un applet Java definidos por una secuencia 'src="javascript:"' • https://www.exploit-db.com/exploits/31817 http://www.0x000000.com/?i=576 http://www.securityfocus.com/bid/29318 https://exchange.xforce.ibmcloud.com/vulnerabilities/42589 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

Mozilla Firefox 3.0 beta 5 allows remote attackers to cause a denial of service (application crash) via JavaScript code that calls document.write in an infinite loop. Mozilla Firefox 3.0 beta 5 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de código JavaScript que llama a document.write en un bucle infinito. • http://es.geocities.com/jplopezy/pruebamozilla.html http://securityreason.com/securityalert/3835 http://www.securityfocus.com/archive/1/491196/100/0/threaded http://www.securityfocus.com/archive/1/491197/100/0/threaded http://www.securityfocus.com/archive/1/491354/100/0/threaded http://www.securityfocus.com/archive/1/491355/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/42154 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 6%CPEs: 49EXPL: 0

The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page. NOTE: this is due to an incorrect fix for CVE-2008-1237. El motor JavaScript de Mozilla Firefox versiones anteriores a 2.0.0.14, Thunderbird versiones anteriores a 2.0.0.14, y SeaMonkey versiones anteriores a 1.1.10 permite a atacantes remotos provocar una denegación de servicio (caída del colector de basura) y posiblemente tener otros impactos mediante un página web manipulada. NOTA: esto es debido a un parche incorrecto para el CVE-2008-1237. • http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html http://secunia.com/advisories/29787 http://secunia.com/advisories/29793 http://secunia.com/advisories/29828 http://secunia.com/advisories/29860 http://secunia.com/advisories/29883 http://secunia.com/advisories/29908 http://secunia.com/advisories/29911 http://secunia.com/advisories/29912 http://secunia.com/advisories/29947 http://secunia.com/advisories/30012 http://secunia.com/advisories/30029 http:// • CWE-399: Resource Management Errors •