Page 8 of 54 results (0.005 seconds)

CVSS: 2.6EPSS: 0%CPEs: 35EXPL: 2

Mozilla before 1.6 does not display the entire URL in the status bar when a link contains %00, which could allow remote attackers to trick users into clicking on unknown or untrusted sites and facilitate phishing attacks. • http://bugzilla.mozilla.org/show_bug.cgi?id=228176 http://secunia.com/advisories/10419 http://www.mozilla.org/projects/security/known-vulnerabilities.html •

CVSS: 2.6EPSS: 0%CPEs: 43EXPL: 0

Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7 allows remote attackers to determine the location of files on a user's hard drive by obscuring a file upload control and tricking the user into dragging text into that control. • http://bugzilla.mozilla.org/show_bug.cgi?id=206859#c0 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:082 •

CVSS: 5.0EPSS: 5%CPEs: 22EXPL: 2

Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated. • http://isec.pl/vulnerabilities/isec-0020-mozilla.txt http://marc.info/?l=bugtraq&m=110436284718949&w=2 http://marc.info/?l=bugtraq&m=110780717916478&w=2 http://secunia.com/advisories/19823 http://www.mozilla.org/security/announce/mfsa2005-06.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.redhat.com/support/errata/RHSA-2005-038.html http://www.securityfocus.com/bid/12131 https://exchange.xforce.ibmcloud.com/vulnerabilities/18711 https:// •

CVSS: 4.3EPSS: 0%CPEs: 53EXPL: 0

Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability. • http://secunia.com/advisories/13129 http://secunia.com/multiple_browsers_window_injection_vulnerability_test http://secunia.com/secunia_research/2004-13/advisory http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mozilla.org/security/announce/mfsa2005-13.html http://www.redhat.com/support/errata/RHSA-2005-176.html http://www.redhat.com/support/errata/RHSA-2005-384.html https://oval.cisecurity.org/re •

CVSS: 5.0EPSS: 0%CPEs: 30EXPL: 1

Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows and facilitate phishing attacks, aka the "Dialog Box Spoofing Vulnerability." • https://www.exploit-db.com/exploits/589 http://secunia.com/advisories/12712 http://secunia.com/multiple_browsers_dialog_box_spoofing_test http://secunia.com/multiple_browsers_form_field_focus_test http://www.mozilla.org/security/announce/mfsa2005-05.html http://www.redhat.com/support/errata/RHSA-2005-323.html http://www.redhat.com/support/errata/RHSA-2005-335.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18864 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg •