Page 491 of 2521 results (0.015 seconds)

CVSS: 7.5EPSS: 4%CPEs: 55EXPL: 2

Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection. • http://secunia.com/advisories/16043 http://secunia.com/advisories/16044 http://secunia.com/advisories/16059 http://secunia.com/advisories/19823 http://www.ciac.org/ciac/bulletins/p-252.shtml http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-46.html http://www.networksecurity.fi/advisories/netscape-multiple-issues.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005& •

CVSS: 5.0EPSS: 2%CPEs: 38EXPL: 1

The InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation. • http://secunia.com/advisories/16043 http://secunia.com/advisories/16059 http://www.ciac.org/ciac/bulletins/p-252.shtml http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-48.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005_45_mozilla.html http://www.redhat.com/support/errata/RHSA-2005-586.html http://www.redhat.com/support/errata/RHSA-2005-587.html http& •

CVSS: 5.1EPSS: 57%CPEs: 2EXPL: 1

Firefox 1.0.3 and 1.0.4, and Netscape 8.0.2, allows remote attackers to execute arbitrary code by tricking the user into using the "Set As Wallpaper" (in Firefox) or "Set as Background" (in Netscape) context menu on an image URL that is really a javascript: URL with an eval statement, aka "Firewalling." • https://www.exploit-db.com/exploits/1102 http://secunia.com/advisories/16043 http://secunia.com/advisories/16044 http://www.ciac.org/ciac/bulletins/p-252.shtml http://www.mikx.de/firewalling http://www.mozilla.org/security/announce/mfsa2005-47.html http://www.networksecurity.fi/advisories/netscape-multiple-issues.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005_45_mozilla.html http://www.redhat.com/s •

CVSS: 5.0EPSS: 43%CPEs: 3EXPL: 1

Mozilla 1.7.8, Firefox 1.0.4, Camino 0.8.4, Netscape 8.0.2, and K-Meleon 0.9, and possibly other products that use the Gecko engine, allow remote attackers to cause a denial of service (application crash) via JavaScript that repeatedly calls an empty function. • http://marc.info/?l=bugtraq&m=112008299210033&w=2 http://securitytracker.com/id?1014292 http://securitytracker.com/id?1014293 http://securitytracker.com/id?1014294 http://securitytracker.com/id? •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

A regression error in Firefox 1.0.3 and Mozilla 1.7.7 allows remote attackers to inject arbitrary Javascript from one page into the frameset of another site, aka the frame injection spoofing vulnerability, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2004-0718. • http://secunia.com/advisories/15601 http://secunia.com/multiple_browsers_frame_injection_vulnerability_test http://sunsolve.sun.com/search/document.do?assetkey=1-26-101952-1 http://www.debian.org/security/2005/dsa-777 http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-51.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005_45_mozilla.html http://www.redhat.com/supp •