Page 470 of 2504 results (0.021 seconds)

CVSS: 7.5EPSS: 97%CPEs: 12EXPL: 0

Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments." Múltiples desbordamientos de búfer de enteros en el motor JavaScript en Mozilla Firefox anterior a 1.5.0.5, Thunderbird anterior a 1.5.0.5, y SeaMonkey anterior a 1.0.3 podrían permitir a atacantes remotos ejecutar código de su elección a través de vectores que afectan a (1) cadena en el método toSource del objeto, objetos Array y String, y (2)"argumentos de cadenas de función" no especificadas. • ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc http://rhn.redhat.com/errata/RHSA-2006-0609.html http://secunia.com/advisories/19873 http://secunia.com/advisories/21216 http://secunia.com/advisories/21228 http://secunia.com/advisories/21229 http://secunia.com/advisories/21243 http://secunia.com/advisories/21246 http://secunia.com/advisories/21250 http://secunia.com/advisories/21262 http://secunia.com/advisories/21269 http://secunia.com/advisories&#x • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 65%CPEs: 12EXPL: 0

Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor. Mozilla Firefox anterior a 1.5.0.5, Thunderbird anterior a 1.5.0.5, y SeaMonkey anterior a 1.0.3 permite a atacantes remotos ejecutar código de su elección a través de la secuencia de comandos que cambian el constructor Object() estandar para retornar a la referencia a un objeto privilegiado y la llamada a las "funciones JavaScript" que usa el constructor. • ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc http://rhn.redhat.com/errata/RHSA-2006-0609.html http://secunia.com/advisories/19873 http://secunia.com/advisories/21216 http://secunia.com/advisories/21228 http://secunia.com/advisories/21229 http://secunia.com/advisories/21243 http://secunia.com/advisories/21246 http://secunia.com/advisories/21250 http://secunia.com/advisories/21262 http://secunia.com/advisories/21269 http://secunia.com/advisories&#x •

CVSS: 7.5EPSS: 97%CPEs: 9EXPL: 3

Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution. Mozilla Firefox 1.5 anterior a 1.5.0.5 y SeaMonkey anterior a 1.0.3 permite a atacantes remotos ejecutar código de su elección cambiando ciertas propiedades del objeto de la ventana de navegación (window.navigator) que es accedido cuando comienza Java, lo cual provoca un caida que desemboca en una ejecución de código. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Mozilla Firefox web browser. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The flaw exists when assigning specific values to the window.navigator object. A lack of checking on assignment causes user supplied data to be later used in the creation of other objects leading to eventual code execution. • https://www.exploit-db.com/exploits/2082 https://www.exploit-db.com/exploits/9946 https://www.exploit-db.com/exploits/16300 ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc http://rhn.redhat.com/errata/RHSA-2006-0609.html http://secunia.com/advisories/19873 http://secunia.com/advisories/21216 http://secunia.com/advisories/21229 http://secunia.com/advisories/21243 http://secunia.com/advisories/21246 http://secunia.com/advisories/21262 http:/ • CWE-16: Configuration •

CVSS: 2.6EPSS: 0%CPEs: 7EXPL: 0

Mozilla Firefox 1.5.0.4 and earlier allows remote user-assisted attackers to cause a denial of service (crash) via a form with a multipart/form-data encoding and a user-uploaded file. NOTE: a third party has claimed that this issue might be related to the LiveHTTPHeaders extension. Mozilla Firefox 1.5.0.4 y anteriores permite a atacantes remotos con la complicidad del usuario provocar una denegación de servicio caída mediante una codificación multipart/form-data en un fichero subido por el usuario. NOTA: una tercera parte afirma que este asunto podría estar relacionado con la extensión LiveHTTPHeaders. • http://www.securityfocus.com/archive/1/440119/100/100/threaded http://www.securityfocus.com/archive/1/440506/100/0/threaded •

CVSS: 6.4EPSS: 8%CPEs: 30EXPL: 0

Cross-domain vulnerability in Mozilla Firefox allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object. NOTE: this description was based on a report that has since been retracted by the original authors. The authors misinterpreted their test results. Other third parties also disputed the original report. Therefore, this is not a vulnerability. • http://isc.sans.org/diary.php?storyid=1448 http://www.securityfocus.com/archive/1/438785/100/0/threaded http://www.securityfocus.com/archive/1/438788/100/0/threaded http://www.securityfocus.com/archive/1/438811/100/0/threaded http://www.securityfocus.com/archive/1/438863/100/0/threaded http://www.securityfocus.com/archive/1/438864/100/0/threaded http://www.securityfocus.com/archive/1/439146/100/0/threaded http://www.securityfocus.com/bid/18734 •