Page 426 of 2282 results (0.032 seconds)

CVSS: 7.5EPSS: 97%CPEs: 9EXPL: 3

Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution. Mozilla Firefox 1.5 anterior a 1.5.0.5 y SeaMonkey anterior a 1.0.3 permite a atacantes remotos ejecutar código de su elección cambiando ciertas propiedades del objeto de la ventana de navegación (window.navigator) que es accedido cuando comienza Java, lo cual provoca un caida que desemboca en una ejecución de código. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Mozilla Firefox web browser. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The flaw exists when assigning specific values to the window.navigator object. A lack of checking on assignment causes user supplied data to be later used in the creation of other objects leading to eventual code execution. • https://www.exploit-db.com/exploits/2082 https://www.exploit-db.com/exploits/9946 https://www.exploit-db.com/exploits/16300 ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc http://rhn.redhat.com/errata/RHSA-2006-0609.html http://secunia.com/advisories/19873 http://secunia.com/advisories/21216 http://secunia.com/advisories/21229 http://secunia.com/advisories/21243 http://secunia.com/advisories/21246 http://secunia.com/advisories/21262 http:/ • CWE-16: Configuration •

CVSS: 2.6EPSS: 0%CPEs: 7EXPL: 0

Mozilla Firefox 1.5.0.4 and earlier allows remote user-assisted attackers to cause a denial of service (crash) via a form with a multipart/form-data encoding and a user-uploaded file. NOTE: a third party has claimed that this issue might be related to the LiveHTTPHeaders extension. Mozilla Firefox 1.5.0.4 y anteriores permite a atacantes remotos con la complicidad del usuario provocar una denegación de servicio caída mediante una codificación multipart/form-data en un fichero subido por el usuario. NOTA: una tercera parte afirma que este asunto podría estar relacionado con la extensión LiveHTTPHeaders. • http://www.securityfocus.com/archive/1/440119/100/100/threaded http://www.securityfocus.com/archive/1/440506/100/0/threaded •

CVSS: 6.4EPSS: 8%CPEs: 30EXPL: 0

Cross-domain vulnerability in Mozilla Firefox allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object. NOTE: this description was based on a report that has since been retracted by the original authors. The authors misinterpreted their test results. Other third parties also disputed the original report. Therefore, this is not a vulnerability. • http://isc.sans.org/diary.php?storyid=1448 http://www.securityfocus.com/archive/1/438785/100/0/threaded http://www.securityfocus.com/archive/1/438788/100/0/threaded http://www.securityfocus.com/archive/1/438811/100/0/threaded http://www.securityfocus.com/archive/1/438863/100/0/threaded http://www.securityfocus.com/archive/1/438864/100/0/threaded http://www.securityfocus.com/archive/1/439146/100/0/threaded http://www.securityfocus.com/bid/18734 •

CVSS: 4.0EPSS: 8%CPEs: 6EXPL: 3

Mozilla Firefox 1.5.0.4, 2.0.x before 2.0.0.8, Mozilla Suite 1.7.13, Mozilla SeaMonkey 1.0.2 and other versions before 1.1.5, and Netscape 8.1 and earlier allow user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form. • https://www.exploit-db.com/exploits/27987 https://www.exploit-db.com/exploits/27986 http://archives.neohapsis.com/archives/bugtraq/2007-02/0166.html http://archives.neohapsis.com/archives/bugtraq/2007-02/0187.html http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://lcamtuf.coredump.cx/focusbug http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046610.html http://lists.virus.org/full-disclosure-0702/msg00225.html http://secunia.com/advisories • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 25%CPEs: 24EXPL: 1

Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code. • http://rhn.redhat.com/errata/RHSA-2006-0609.html http://secunia.com/advisories/21269 http://secunia.com/advisories/21270 http://secunia.com/advisories/21336 http://secunia.com/advisories/21532 http://secunia.com/advisories/21631 http://secunia.com/advisories/22247 http://secunia.com/advisories/22299 http://secunia.com/advisories/22342 http://secunia.com/advisories/22849 http://www.debian.org/security/2006/dsa-1192 http://www.debian.org/security/2006/dsa-1210 http:&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •