Page 498 of 2521 results (0.010 seconds)

CVSS: 2.1EPSS: 0%CPEs: 31EXPL: 0

Firefox before 1.0.1 and Mozilla Suite before 1.7.6 use a predictable filename for the plugin temporary directory, which allows local users to delete arbitrary files of other users via a symlink attack on the plugtmp directory. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mozilla.org/security/announce/mfsa2005-28.html http://www.redhat.com/support/errata/RHSA-2005-176.html http://www.redhat.com/support/errata/RHSA-2005-384.html http://www.securityfocus.com/bid/12659 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10954 https://access.redhat.com/security/cve/CVE-2005-0578 https&# •

CVSS: 5.1EPSS: 68%CPEs: 1EXPL: 2

Firefox 1.0 allows remote attackers to execute arbitrary code via plugins that load "privileged content" into frames, as demonstrated using certain XUL events when a user drags a scrollbar two times, aka "Firescrolling." • http://marc.info/?l=bugtraq&m=110935267500395&w=2 http://securitytracker.com/id?1013301 http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mikx.de/?p=11 http://www.mozilla.org/security/announce/mfsa2005-27.html http://www.redhat.com/support/errata/RHSA-2005-176.html http://www.redhat.com/support/errata/RHSA-2005-384.html https://oval.cisecurity.org/repository/search/definition/oval%3 •

CVSS: 5.1EPSS: 27%CPEs: 1EXPL: 1

Firefox 1.0 does not prevent the user from dragging an executable file to the desktop when it has an image/gif content type but has a dangerous extension such as .bat or .exe, which allows remote attackers to bypass the intended restriction and execute arbitrary commands via malformed GIF files that can still be parsed by the Windows batch file parser, aka "firedragging." • http://marc.info/?l=bugtraq&m=110780995232064&w=2 http://secunia.com/advisories/19823 http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mikx.de/firedragging http://www.mozilla.org/security/announce/mfsa2005-25.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.securityfocus.com/bid/12468 https://bugzilla.mozilla.org/show_bug.cgi?id=279945 https://oval.ci •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 1

Firefox 1.0 allows remote attackers to modify Boolean configuration parameters for the about:config site by using a plugin such as Flash, and the -moz-opacity filter, to display the about:config site then cause the user to double-click at a certain screen position, aka "Fireflashing." • http://marc.info/?l=bugtraq&m=110781055630856&w=2 http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mikx.de/fireflashing http://www.mozilla.org/security/announce/mfsa2005-27.html http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html http://www.redhat.com/support/errata/RHSA-2005-176.html http://www.redhat.com/support/errata/RHSA-2005-323.html http://www.redhat. •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 6

Firefox 1.0 does not invoke the Javascript Security Manager when a user drags a javascript: or data: URL to a tab, which allows remote attackers to bypass the security model, aka "firetabbing." • http://marc.info/?l=bugtraq&m=110781134617144&w=2 http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mikx.de/firetabbing http://www.mozilla.org/security/announce/mfsa2005-26.html http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html http://www.redhat.com/support/errata/RHSA-2005-176.html http://www.redhat.com/support/errata/RHSA-2005-384.html https://bugzilla.mozill •