Page 446 of 2282 results (0.006 seconds)

CVSS: 7.5EPSS: 25%CPEs: 11EXPL: 0

The Plugin Finder Service (PFS) in Firefox before 1.0.3 allows remote attackers to execute arbitrary code via a javascript: URL in the PLUGINSPAGE attribute of an EMBED tag. • http://secunia.com/advisories/14938 http://www.mozilla.org/security/announce/mfsa2005-34.html http://www.redhat.com/support/errata/RHSA-2005-383.html http://www.securityfocus.com/bid/13228 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100024 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10279 https://access.redhat.com/security/cve/CVE-2005-0752 https://bugzilla.redhat.com/show_bug.cgi?id=1617568 •

CVSS: 7.5EPSS: 3%CPEs: 34EXPL: 0

Firefox before 1.0.3 and Mozilla Suite before 1.7.7, when blocking a popup, allows remote attackers to execute arbitrary code via a javascript: URL that is executed when the user selects the "Show javascript" option. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/14938 http://secunia.com/advisories/14992 http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml http://www.mozilla.org/security/announce/mfsa2005-35.html http://www.redhat.com/support/errata/RHSA-2005-383.html http://www.redhat.com/support/errata/RHSA-2005-384.html http://www.redhat.com/support/errata/RHSA-2005-386.html http://www.securityfocus.com/bid/15495 •

CVSS: 7.5EPSS: 0%CPEs: 34EXPL: 0

Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary script in other domains via a setter function for a variable in the target domain, which is executed when the user visits that domain, aka "Cross-site scripting through global scope pollution." • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/14938 http://secunia.com/advisories/14992 http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml http://www.mozilla.org/security/announce/mfsa2005-36.html http://www.redhat.com/support/errata/RHSA-2005-383.html http://www.redhat.com/support/errata/RHSA-2005-384.html http://www.redhat.com/support/errata/RHSA-2005-386.html http://www.securityfocus.com/bid/13230 •

CVSS: 7.5EPSS: 89%CPEs: 34EXPL: 1

The favicon functionality in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary code via a <LINK rel="icon"> tag with a javascript: URL in the href attribute, aka "Firelinking." • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/14938 http://secunia.com/advisories/14992 http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml http://www.kb.cert.org/vuls/id/973309 http://www.mikx.de/firelinking http://www.mozilla.org/security/announce/mfsa2005-37.html http://www.redhat.com/support/errata/RHSA-2005-383.html http://www.redhat.com/support/errata/RHSA-2005-384.html http://www.redha • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 35EXPL: 2

Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to replace existing search plugins with malicious ones using sidebar.addSearchEngine and the same filename as the target engine, which may not be displayed in the GUI, which could then be used to execute malicious script, aka "Firesearching 2." • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/14938 http://secunia.com/advisories/14992 http://secunia.com/advisories/14996 http://www.mikx.de/firesearching http://www.mozilla.org/security/announce/mfsa2005-38.html http://www.redhat.com/support/errata/RHSA-2005-383.html http://www.redhat.com/support/errata/RHSA-2005-384.html http://www.redhat.com/support/errata/RHSA-2005-386.html http://www.securityfocus.com •