Page 6 of 92 results (0.005 seconds)

CVSS: 5.1EPSS: 94%CPEs: 46EXPL: 0

Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/14654 http://secunia.com/advisories/19823 http://www.ciac.org/ciac/bulletins/p-160.shtml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.kb.cert.org/vuls/id/557948 http://www.mozilla.org/security/announce/mfsa2005-30.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.redhat.com/support/errata/RHSA-2005-323& •

CVSS: 5.1EPSS: 13%CPEs: 31EXPL: 2

FireFox 1.0.1 and Mozilla before 1.7.6 do not sufficiently address all attack vectors for loading chrome files and hijacking drag and drop events, which allows remote attackers to execute arbitrary XUL code by tricking a user into dragging a scrollbar, a variant of CVE-2005-0527, aka "Firescrolling 2." • http://marc.info/?l=bugtraq&m=111168413007891&w=2 http://mikx.de/firescrolling2 http://secunia.com/advisories/14654 http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mozilla.org/security/announce/mfsa2005-32.html http://www.redhat.com/support/errata/RHSA-2005-335.html http://www.redhat.com/support/errata/RHSA-2005-336.html http://www.redhat.com/support/errata/RHSA-2005-384.html http://www.securityfocus.com/bid/12885 http://www.vupen.com/e •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to overwrite arbitrary files by tricking the user into downloading a .LNK (link) file twice, which overwrites the file that was referenced in the first .LNK file. • http://secunia.com/advisories/19823 http://www.mozilla.org/security/announce/mfsa2005-21.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.securityfocus.com/bid/12659 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100037 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption. • http://secunia.com/advisories/19823 http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.idefense.com/application/poi/display?id=200&type=vulnerabilities http://www.mozilla.org/security/announce/mfsa2005-18.html http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.redhat.com/support/errata/RHSA-2005-176. •

CVSS: 2.6EPSS: 0%CPEs: 31EXPL: 0

Firefox before 1.0.1 and Mozilla before 1.7.6, when displaying the HTTP Authentication dialog, do not change the focus to the tab that generated the prompt, which could facilitate spoofing and phishing attacks. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mozilla.org/security/announce/mfsa2005-24.html http://www.redhat.com/support/errata/RHSA-2005-176.html http://www.redhat.com/support/errata/RHSA-2005-384.html https://bugzilla.mozilla.org/show_bug.cgi?id=277574 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100034 https://oval.cisecurity.org/repository/search/d •