Page 453 of 2504 results (0.022 seconds)

CVSS: 9.3EPSS: 92%CPEs: 10EXPL: 0

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption. Múltiples vulnerabilidades no especificadas en el motor de navegador Mozilla Firefox versiones anteriores 2.0.0.5 y Thunderbird versiones anteriores a 2.0.0.5 permiten a atacantes remotos provocar una denegación de servicio (caída) mediante vectores no especificados que disparan corrupción de memoria. • ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579 http://secunia.com/advisories/25589 http://secunia.com/advisories/26072 http://secunia.com/advisories/26095 http://secunia.com/advisories/26096 http://secunia.com/advisories/26103 http://se •

CVSS: 9.3EPSS: 72%CPEs: 5EXPL: 0

Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.5 allow remote attackers to execute arbitrary code via a crafted XPCNativeWrapper. Múltiples vulnerabilidades no especificadas en Mozilla Firefox anterior a 2.0.0.5 permite a atacantes remotos ejecutar código de su elección mediante un XPCNativeWrapper manipulado. • ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://secunia.com/advisories/25589 http://secunia.com/advisories/26072 http://secunia.com/advisories/26095 http://secunia.com/advisories/26103 http://secunia.com/advisories/26106 http://secunia.com/advisories/26107 http://secunia.com/advisories/26149 http://secu •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 2

Mozilla Firefox 2.0.0.4 allows remote attackers to cause a denial of service by opening multiple tabs in a popup window. NOTE: this issue has been disputed by third party researchers, stating that "this does not crash on me, and I can't see a likely mechanism of action that would lead to a DoS condition. ** IMPUGNADA ** Mozilla Firefox 2.0.0.4 permite a atacantes remotos provocar denegación de servicio a través de la apertura de múltiples pestañas en una ventana automática. NOTA: Este asunto ha sido impugnado por investigaciones de terceros, basándose en que "esto no se estrella en mí, y no puedo ver un mecanismo probable de la acción que conduciría a una condición de DoS. " • http://osvdb.org/45812 http://www.securityfocus.com/archive/1/473187 http://www.securityfocus.com/archive/1/473212 http://www.securityfocus.com/bid/24820 •

CVSS: 6.8EPSS: 90%CPEs: 31EXPL: 2

Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs. Mozilla Firefox versiones anteriores a 1.8.0.13 y 1.8.1.x versiones anteriores a 1.8.1.5 no realiza comprobaciones de seguridad de zona cuando procesa un wyciwyg URI, lo cual permite a atacantes remotos obtener información confidencial, envenenar la caché de navegador, y posiblemente habilitar posteriores vectores de ataque mediante (1) controles de redirección HTTP 302, (2) XMLHttpRequest, ó (3) URIs de ver-código-fuente. • ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://lcamtuf.coredump.cx/ffcache http://osvdb.org/38028 http://secunia.com/advisories/25589 http://secunia.com/advisories/25990 http://secunia.com/advisories/26072 http://secunia.com/advisories/26103 http://secunia.com/advisories/26107 http://secunia.com/adv • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 4%CPEs: 26EXPL: 1

The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field. El manejo del enfoque para el evento onkeydown en Mozilla Firefox versiones 1.5.0.12, 2.0.0.0.4 y otras versiones anteriores a 2.0.0.8, y SeaMonkey versiones anteriores a 1.1.5, permite a atacantes remotos cambiar el enfoque del campo y copiar las pulsaciones de teclas por medio del atributo "for" en una etiqueta, lo que omite la prevención del enfoque, tal y como es demostrado cambiando el enfoque desde un área de texto hacia un campo de carga de archivos. • http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0646.html http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0658.html http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://osvdb.org/37994 http://secunia.com/advisories/25904 http://secunia.com/advisories/27276 http://secunia.com/advisories/27298 http://secunia.com/advisories/27325 http://secunia.com/advisories/27327 http://secunia.com/advisories/27335 http://secunia.com/advisories •