Page 460 of 2521 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

(1) Mozilla Firefox 2.0.0.3 and (2) GNU IceWeasel 2.0.0.3 allow remote attackers to cause a denial of service (browser crash or system hang) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/. (1) Mozilla Firefox 2.0.0.3 y (2) GNU IceWeasel 2.0.0.3 permite a atacantes remotos provocar denegación de servicio (caida del navegador o cuelgue de aplicación) a través de JavaScript que valida una expresión regular con una cadena larga, como se demostró utilizando /(.)*/. • http://www.securityfocus.com/archive/1/466017/100/0/threaded http://www.securityfocus.com/archive/1/466147/100/0/threaded http://www.securityfocus.com/archive/1/466220/100/0/threaded •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Mozilla Firefox 2.0.0.1 through 2.0.0.3 does not canonicalize URLs before checking them against the phishing site blacklist, which allows remote attackers to bypass phishing protection via multiple / (slash) characters in the URL. Mozilla Firefox 2.0.0.1 hasta 2.0.0.3 no normaliza las URLs antes de validarlas contra la lista negra de phishing, lo cual permite a atacantes remotos evitar la protección phishing a través de múltiples caracteres / (slash) en la URL. • http://osvdb.org/34535 http://www.securityfocus.com/archive/1/464149/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/33486 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Mozilla Firefox 2.0.0.3 does not check URLs embedded in (1) object or (2) iframe HTML tags against the phishing site blacklist, which allows remote attackers to bypass phishing protection. Mozilla Firefox 2.0.0.3 no comprueba las URL's embebidas en (1) objeto ó (2) Etiquetas HTML "iframe" contra la lista negra de sitios phising, lo cual permite a atacantes remotos evitar la protección phishing. • http://securityreason.com/securityalert/2488 http://www.securityfocus.com/archive/1/464041/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/33487 •

CVSS: 6.8EPSS: 4%CPEs: 5EXPL: 1

The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response. La implementación del protocolo FTP en Mozilla Firefox anterior a versión 1.5.0.11 y versión 2.x anterior a 2.0.0.3 permite a los atacantes remotos forzar al cliente a conectarse a otros servidores, realizar un análisis de puerto proxy o conseguir información confidencial por medio de la especificación de una dirección de servidor alterno en una respuesta PASV de FTP. • https://www.exploit-db.com/exploits/29768 http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://secunia.com/advisories/25476 http://secunia.com/advisories/25490 http://secunia.com/advisories/25858 http://www.mozilla.org/security/announce/2007/mfsa2007-11.html http://www.novell.com/linux/security/advisories/2007_36_mozilla.html http://www.openwall.com/lists/oss-security/2020/12/09/ • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 3

AcroPDF.DLL in Adobe Reader 8.0, when accessed from Mozilla Firefox, Netscape, or Opera, allows remote attackers to cause a denial of service (unspecified resource consumption) via a .pdf URL with an anchor identifier that begins with search= followed by many %n sequences, a different vulnerability than CVE-2006-6027 and CVE-2006-6236. AcroPDF.DLL de Adobe Reader 8.0, cuando se accede desde Mozilla Firefox, Netscape, ó Opera, permite a atacantes remotos provocar una denegación de servicio (agotamiento sin especificar de recursos) mediante una URL .pdf con un identificador de marcador que comienza con search= seguido de muchas secuencias %n, vulnerabilidad distinta a CVE-2006-6027 y CVE-2006-6236. • https://www.exploit-db.com/exploits/3430 http://www.securityfocus.com/bid/22856 http://www.securityfocus.com/data/vulnerabilities/exploits/22856.html https://exchange.xforce.ibmcloud.com/vulnerabilities/32896 • CWE-400: Uncontrolled Resource Consumption •