Page 65 of 689 results (0.012 seconds)

CVSS: 7.5EPSS: 21%CPEs: 100EXPL: 0

YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript. YARR, como se usa en Mozilla Firefox antes de v9.0, Thunderbird antes de v9.0, y SeaMonkey antes de v2.6 en Mac OS X, permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente ejecutar código de su elección a través de un JavaScript modificado. • http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html http://secunia.com/advisories/47302 http://secunia.com/advisories/47334 http://secunia.com/advisories/49055 http://www.mandriva.com/security/advisories?name=MDVSA-2011:192 http://www.mozilla.org/security/announce/2011/mfsa2011-54.html http://www.securitytracker.com/id?1026445 http://www.securitytracker.com/id?1026446 http://www.securitytracker& • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 116EXPL: 0

Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page. Mozilla Firefox versiones 4.x hasta 8.0, Thunderbird versiones 5.0 hasta 8.0, y SeaMonkey anterior a versión 2.6, Permitir a los atacantes remotos capturar las pulsaciones de teclas (keystrokes) introducidas en una página web, incluso cuando JavaScript está deshabilitado, mediante el uso de eventos accessKey de animación SVG dentro de esa página web. • http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html http://osvdb.org/77954 http://secunia.com/advisories/47302 http://secunia.com/advisories/47334 http://secunia.com/advisories/49055 http://www.mandriva.com/security/advisories?name=MDVSA-2011:192 http://www.mozilla.org/security/announce/2011/mfsa2011-56.html http://www.securitytracker.com/id?1026445 http://www.securitytracker.com/id?1026446 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 25%CPEs: 100EXPL: 0

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors. Múltiples vulnerabilidades no especificadas en en motor de navegación de Mozilla Firefox antes de v8.0, Thunderbird antes de v8.0, y SeaMonkey antes de v2.6, permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria y caída de la aplicacion) o posiblemente ejecutar código de su elección a través de vectores que provocan un desajuste de comportamiento con la función nsDOMMessageEvent::GetData y otros vectores desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html http://osvdb.org/77952 http://secunia.com/advisories/47302 http://secunia.com/advisories/47334 http://secunia.com/advisories/49055 http://www.mandriva.com/security/advisories?name=MDVSA-2011:192 http://www.mozilla.org/security/announce/2011/mfsa2011-53.html http://www.securitytracker.com/id?1026445 http://www.securitytracker.com/id?1026446 •

CVSS: 4.3EPSS: 0%CPEs: 150EXPL: 1

The Cascading Style Sheets (CSS) implementation in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document, a related issue to CVE-2010-2264. La implementación de las Hojas de Estilo en Cascada (CSS) enen Mozilla Firefox antes de v4.0, Thunderbird antes de v3.3 y SeaMonkey antes de v2.1, no controla correctamente el :visited pseudo-class, lo que permite a atacantes remotos obtener información sensible acerca de las páginas web visitadas a través de un documento HTML manipulado. Relacionado con CVE-2010-2264. • http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak http://bugzilla.mozilla.org/show_bug.cgi?id=147777 http://w2spconf.com/2010/papers/p26.pdf https://developer.mozilla.org/en/CSS/Privacy_and_the_:visited_selector https://exchange.xforce.ibmcloud.com/vulnerabilities/71816 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 150EXPL: 0

The layout engine in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 executes different code for visited and unvisited links during the processing of Cascading Style Sheets (CSS) token sequences, which makes it easier for remote attackers to obtain sensitive information about visited web pages via a timing attack. El motor de diseño en Mozilla Firefox antes de v4.0, Thunderbird antes de v3.3 y SeaMonkey antes de v2.1, ejecuta código diferente para los enlaces visitados y no visitados durante la tramitación de las secuencias de señal de Hojas de Estilo en Cascada (CSS), lo que facilita a los atacantes remotos obtener información sensible acerca de las páginas Web visitadas a través de un ataque de oportunidad. • http://blog.mozilla.com/security/2010/03/31/plugging-the-css-history-leak https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14456 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •