Page 461 of 2504 results (0.022 seconds)

CVSS: 7.5EPSS: 97%CPEs: 51EXPL: 2

Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code. Una vulnerabilidad en los navegadores basados ??en Mozilla, incluidos Firefox anterior a versión 1.5.0.10 y versión 2.x anterior a 2.0.0.2, y SeaMonkey anterior a versión 1.0.8, permiten a los atacantes remotos omitir la políticas de mismo origen, robar cookies y conducir otros ataques escribiendo un URI con un byte NULL a la propiedad DOM del host (location.hostname), debido a las interacciones con el código de resolución DNS. • https://www.exploit-db.com/exploits/3340 ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc http://fedoranews.org/cms/node/2713 http://fedoranews.org/cms/node/2728 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://lcamtuf.dione.cc/ffhostname.html http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html http://rhn.redhat.com/errat • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.4EPSS: 1%CPEs: 2EXPL: 1

Mozilla Firefox 2.0.0.1 allows remote attackers to bypass the Phishing Protection mechanism by adding certain characters to the end of the domain name, as demonstrated by the "." and "/" characters, which is not caught by the Phishing List blacklist filter. Mozilla Firefox 2.0.0.1 permite a atacantes remotos evitar el mecanismo de Protección de Phising añadiendo caracteres concretos al final del nombre de dominio, como se demuestra con los caractere "." y "/", que no se capturan por el filtro de lista negra Lista de Phising. • http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0516.html http://kaneda.bohater.net/security/20070111-firefox_2.0.0.1_bypass_phishing_protection.php http://osvdb.org/33705 http://www.securityfocus.com/archive/1/459265/100/0/threaded https://bugzilla.mozilla.org/show_bug.cgi?id=367538 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 55%CPEs: 1EXPL: 1

Cross-zone vulnerability in Mozilla Firefox 1.5.0.9 considers blocked popups to have an internal zone origin, which allows user-assisted remote attackers to cross zone restrictions and read arbitrary file:// URIs by convincing a user to show a blocked popup. Vulnerabilidad de cruce de sitios en Mozilla Firefox 1.5.0.9 considera que las ventanas emergentes bloqueadas tienen un origen de zona interno, lo cual permite a usuarios remotos con la complicidad del usuario cruzar restricciones de zona y leer URIs tipo "file://" de su elección convenciendo al usuario de que muestre una ventana emergente bloqueada. • ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc http://fedoranews.org/cms/node/2713 http://fedoranews.org/cms/node/2728 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052209.html http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052211.html http://lists.suse.com/archive/suse •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 1

The nsExternalAppHandler::SetUpTempFile function in Mozilla Firefox 1.5.0.9 creates temporary files with predictable filenames based on creation time, which allows remote attackers to execute arbitrary web script or HTML via a crafted XMLHttpRequest. La función nsExternalAppHandler::SetUpTempFile del Mozilla Firefox 1.5.0.9 crea ficheros temporales con nombres de ficheros predecibles basados en la fecha de creación, lo que permite a atacantes remotos ejecutar secuencias de comandos web o HTML de su elección mediante la manipulación del XMLHttpRequest. • http://secunia.com/advisories/24393 http://secunia.com/advisories/24437 http://security.gentoo.org/glsa/glsa-200703-04.xml http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml http://www.osvdb.org/32108 http://www.securityfocus.com/archive/1/459162/100/0/threaded http://www.securityfocus.com/archive/1/459163/100/0/threaded http://www.securityfocus.com/bid/22396 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Mozilla Firefox 2.0, possibly only when running on Windows, allows remote attackers to bypass the Phishing Protection mechanism by representing an IP address in (1) dotted-hex, (2) dotted-octal, (3) single decimal integer, (4) single hex integer, or (5) single octal integer format, which is not captured by the blacklist filter. Mozilla Firefox 2.0, posiblemente sólo cuando se ejecuta bajo Windows, permite a atacantes remotos evitar el mecanismo de Phishing mediante la representación de una dirección IP en los formatos (1) dotted-hex, (2) dotted-octal, (3) entero decimal simple (single decimal integer), (4) entero hex simple (single hex integer) o (5) entero octal simple (single octal integer),que no son capturados por los filtros de las listas negras. • http://sla.ckers.org/forum/read.php?13%2C2253 https://bugzilla.mozilla.org/show_bug.cgi?id=356355 • CWE-20: Improper Input Validation •