Page 477 of 2521 results (0.008 seconds)

CVSS: 7.5EPSS: 50%CPEs: 25EXPL: 0

Unspecified vulnerability in Mozilla Firefox before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to execute arbitrary code by using the nsISelectionPrivate interface of the Selection object to add a SelectionListener and create notifications that are executed in a privileged context. • http://secunia.com/advisories/20376 http://secunia.com/advisories/20394 http://secunia.com/advisories/20561 http://secunia.com/advisories/21176 http://secunia.com/advisories/21178 http://secunia.com/advisories/21183 http://secunia.com/advisories/21188 http://secunia.com/advisories/21324 http://secunia.com/advisories/21532 http://secunia.com/advisories/22066 http://securitytracker.com/id?1016202 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1 http://www& •

CVSS: 5.0EPSS: 59%CPEs: 1EXPL: 2

Unspecified versions of Mozilla Firefox allow remote attackers to cause a denial of service (crash) via a web page that contains a large number of nested marquee tags. NOTE: a followup post indicated that the initial report could not be verified. • https://www.exploit-db.com/exploits/1867 http://www.securityfocus.com/archive/1/435373/100/0/threaded http://www.securityfocus.com/archive/1/435411/100/0/threaded http://www.securityfocus.com/archive/1/435882/100/0/threaded http://www.securityfocus.com/archive/1/436268/100/0/threaded http://www.securityfocus.com/bid/18165 https://exchange.xforce.ibmcloud.com/vulnerabilities/26898 •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 1

Mozilla Suite 1.7.13, Mozilla Firefox 1.5.0.3 and possibly other versions before before 1.8.0, and Netscape 7.2 and 8.1, and possibly other versions and products, allows remote user-assisted attackers to obtain information such as the installation path by causing exceptions to be thrown and checking the message contents. • http://secunia.com/advisories/20244 http://secunia.com/advisories/20255 http://secunia.com/advisories/20256 http://secunia.com/advisories/21532 http://securityreason.com/securityalert/960 http://www.mandriva.com/security/advisories?name=MDKSA-2006:143 http://www.mandriva.com/security/advisories?name=MDKSA-2006:145 http://www.securityfocus.com/archive/1/434696/100/0/threaded https://bugzilla.mozilla.org/attachment.cgi?id=164547 https://bugzilla.mozilla.org/show_bug.cgi?id=267645 https&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

IE Tab 1.0.9 plugin for Mozilla Firefox 1.5.0.3 allows remote user-assisted attackers to cause a denial of service (application crash), possibly due to a null dereference, via certain Javascript, as demonstrated using a url parameter to the content/reloaded.html page in a chrome:// URI. Some third-party researchers claim that they are unable to reproduce this vulnerability. • http://www.securityfocus.com/archive/1/434280/100/0/threaded http://www.securityfocus.com/archive/1/434519/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26540 •

CVSS: 2.6EPSS: 2%CPEs: 1EXPL: 0

Mozilla Firefox 1.5.0.3 allows remote attackers to cause a denial of service via a web page with a large number of IMG elements in which the SRC attribute is a mailto URI. NOTE: another researcher found that the web page caused a temporary browser slowdown instead of a crash. • http://securityreason.com/securityalert/876 http://www.securityfocus.com/archive/1/433534/100/0/threaded http://www.securityfocus.com/archive/1/433568/100/0/threaded http://www.securityfocus.com/archive/1/433984/30/5010/threaded http://www.securityview.org/confirmed-bug-in-firefox-1503.html •