Page 454 of 2337 results (0.019 seconds)

CVSS: 5.0EPSS: 96%CPEs: 38EXPL: 3

Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string. • https://www.exploit-db.com/exploits/16306 https://www.exploit-db.com/exploits/9947 http://secunia.com/advisories/16043 http://secunia.com/advisories/16044 http://secunia.com/advisories/16059 http://secunia.com/advisories/19823 http://www.ciac.org/ciac/bulletins/p-252.shtml http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-50.html http://www.networksecurity.fi/advisories/netscape-multiple-issues.html http://www.novell.com/linux •

CVSS: 7.5EPSS: 9%CPEs: 38EXPL: 1

Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing"). • http://secunia.com/advisories/16043 http://secunia.com/advisories/16044 http://secunia.com/advisories/16059 http://secunia.com/advisories/19823 http://www.ciac.org/ciac/bulletins/p-252.shtml http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-55.html http://www.networksecurity.fi/advisories/netscape-multiple-issues.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005& •

CVSS: 7.5EPSS: 10%CPEs: 13EXPL: 1

Firefox before 1.0.5 allows remote attackers to steal sensitive information by opening a malicious link in the Firefox sidebar using the _search target, then injecting script into other pages via a data: URL. • http://secunia.com/advisories/16043 http://www.ciac.org/ciac/bulletins/p-252.shtml http://www.mozilla.org/security/announce/mfsa2005-49.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005_45_mozilla.html http://www.redhat.com/support/errata/RHSA-2005-586.html http://www.securityfocus.com/bid/14242 http://www.vupen.com/english/advisories/2005/1075 https://bugzilla.mozilla.org/show_bug.cgi?id=294074 h •

CVSS: 2.6EPSS: 0%CPEs: 38EXPL: 2

Firefox before 1.0.5 and Mozilla before 1.7.9 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability." • http://secunia.com/advisories/15489 http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-54.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005_45_mozilla.html http://www.redhat.com/support/errata/RHSA-2005-586.html http://www.redhat.com/support/errata/RHSA-2005-587.html http://www.securityfocus.com&# •

CVSS: 5.0EPSS: 43%CPEs: 3EXPL: 1

Mozilla 1.7.8, Firefox 1.0.4, Camino 0.8.4, Netscape 8.0.2, and K-Meleon 0.9, and possibly other products that use the Gecko engine, allow remote attackers to cause a denial of service (application crash) via JavaScript that repeatedly calls an empty function. • http://marc.info/?l=bugtraq&m=112008299210033&w=2 http://securitytracker.com/id?1014292 http://securitytracker.com/id?1014293 http://securitytracker.com/id?1014294 http://securitytracker.com/id? •