Page 488 of 2504 results (0.013 seconds)

CVSS: 2.6EPSS: 0%CPEs: 38EXPL: 2

Firefox before 1.0.5 and Mozilla before 1.7.9 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability." • http://secunia.com/advisories/15489 http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-54.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005_45_mozilla.html http://www.redhat.com/support/errata/RHSA-2005-586.html http://www.redhat.com/support/errata/RHSA-2005-587.html http://www.securityfocus.com&# •

CVSS: 5.0EPSS: 43%CPEs: 3EXPL: 1

Mozilla 1.7.8, Firefox 1.0.4, Camino 0.8.4, Netscape 8.0.2, and K-Meleon 0.9, and possibly other products that use the Gecko engine, allow remote attackers to cause a denial of service (application crash) via JavaScript that repeatedly calls an empty function. • http://marc.info/?l=bugtraq&m=112008299210033&w=2 http://securitytracker.com/id?1014292 http://securitytracker.com/id?1014293 http://securitytracker.com/id?1014294 http://securitytracker.com/id? •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

A regression error in Firefox 1.0.3 and Mozilla 1.7.7 allows remote attackers to inject arbitrary Javascript from one page into the frameset of another site, aka the frame injection spoofing vulnerability, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2004-0718. • http://secunia.com/advisories/15601 http://secunia.com/multiple_browsers_frame_injection_vulnerability_test http://sunsolve.sun.com/search/document.do?assetkey=1-26-101952-1 http://www.debian.org/security/2005/dsa-777 http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-51.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005_45_mozilla.html http://www.redhat.com/supp •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows allows remote attackers to hide the real file types of downloaded files via the Content-Type HTTP header and a filename containing whitespace, dots, or ASCII byte 160. • http://secunia.com/advisories/12979 http://secunia.com/secunia_research/2004-11/advisory http://www.osvdb.org/16431 •

CVSS: 7.5EPSS: 1%CPEs: 34EXPL: 0

Firefox before 1.0.4 and Mozilla Suite before 1.7.8 does not properly implement certain security checks for script injection, which allows remote attackers to execute script via "Wrapped" javascript: URLs, as demonstrated using (1) a javascript: URL in a view-source: URL, (2) a javascript: URL in a jar: URL, or (3) "a nested variant." • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://securitytracker.com/id?1013962 http://securitytracker.com/id?1013963 http://www.mozilla.org/security/announce/mfsa2005-43.html http://www.redhat.com/support/errata/RHSA-2005-434.html http://www.redhat.com/support/errata/RHSA-2005-435.html http://www.securityfocus.com/bid/13641 http://www.securityfocus.com/bid/15495 http://www.vupen.com/english/advisories/2005/0530 https://oval.cisecurity.o •