Page 6 of 31 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

The (1) Mozilla 1.6, (2) Firebird 0.7 and (3) Firefox 0.8 web browsers do not properly verify that cached passwords for SSL encrypted sites are only sent via SSL encrypted sessions to the site, which allows a remote attacker to cause a cached password to be sent in cleartext to a spoofed site. Los navegadores Mozilla 1.6, Firebird 0.7 y Firefox 0.8 no verifican adecuadamente que las contraseñas almacenadas en caché de sitios cifrados con SSL sean sólo enviadas mediante sesiones cifradas con el sitio, lo que permite a atacantes remotos hacer que contraseñas en caché sean enviadas en texto plano al sitio suplantado. • http://bugzilla.mozilla.org/show_bug.cgi?id=226278 http://www.mandriva.com/security/advisories?name=MDKSA-2004:082 http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7 https://exchange.xforce.ibmcloud.com/vulnerabilities/17018 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

The (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 web browsers do not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability. Los navegadores web (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 no previenen adecuadamente que un marco de un dominio inyecte contenido en un marco que pertenece a otro dominio, lo que facilita la suplantación de sitios web y otros ataques. Vulnerabilidad también conocida como "de inyección de marco". • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://bugzilla.mozilla.org/show_bug.cgi?id=246448 http://marc.info/?l=bugtraq&m=109900315219363&w=2 http://secunia.com/advisories/11978 http://secunia.com/multiple_browsers_frame_injection_vulnerability_test http://www.debian.org/security/2005/dsa-777 http://www.debian.org/security/2005/dsa-810 http://www.mandriva.com/security/advisories?name=MDKSA-2004:082 http://www.novell.com/linux/security/ad •

CVSS: 5.0EPSS: 22%CPEs: 9EXPL: 4

Buffer overflow in ibserver for Firebird Database 1.0 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows remote attackers to cause a denial of service (crash) via a long database name, as demonstrated using the gsec command. • https://www.exploit-db.com/exploits/303 https://www.exploit-db.com/exploits/24165 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0027.html http://marc.info/?l=bugtraq&m=108611386202493&w=2 http://secunia.com/advisories/11756 http://secunia.com/advisories/19350 http://securitytracker.com/id?1010381 http://www.debian.org/security/2006/dsa-1014 http://www.osvdb.org/6408 http://www.osvdb.org/6624 http://www.securiteam.com/unixfocus/5AP0P0UCUO.html http:& •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 3

Buffer overflow in Firebird 1.0.2 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows local users to execute arbitrary code via a long INTERBASE environment variable when calling (1) gds_inet_server, (2) gds_lock_mgr, or (3) gds_drop. Desbordamiento de búfer en Firebird 1.0.2 permite que usuarios locales ejecuten comandos arbitrarios mediante una variable INTERBASE larga cuando se llama a (1) gds_inet_server, (2) gds_lock_mgr, o (3) gds_drop. • https://www.exploit-db.com/exploits/29 https://www.exploit-db.com/exploits/21566 https://www.exploit-db.com/exploits/21565 http://marc.info/?l=bugtraq&m=105259012802997&w=2 http://seclists.org/lists/bugtraq/2002/Jun/0212.html http://secunia.com/advisories/8758 http://security.gentoo.org/glsa/glsa-200405-18.xml http://www.securityfocus.com/bid/7546 https://exchange.xforce.ibmcloud.com/vulnerabilities/11977 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow gds_lock_mgr of Interbase Database 6.x allows local users to gain privileges via a long ISC_LOCK_ENV environment variable (INTERBASE_LOCK). Desbordamiento de búfer gds_lock_mgr de Interbase Database 6.x permite a usuarios locales la obtención de privilegios mediante una variable de entorno ISC_LOCK_ENV larga. (INTERBASE_LOCK). • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0003.html http://marc.info/?l=bugtraq&m=104940730819887&w=2 http://www.secnetops.com/research/advisories/SRT2003-04-03-1300.txt •