Page 9 of 77 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 53EXPL: 0

Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability. • http://secunia.com/advisories/13129 http://secunia.com/multiple_browsers_window_injection_vulnerability_test http://secunia.com/secunia_research/2004-13/advisory http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml http://www.mozilla.org/security/announce/mfsa2005-13.html http://www.redhat.com/support/errata/RHSA-2005-176.html http://www.redhat.com/support/errata/RHSA-2005-384.html https://oval.cisecurity.org/re •

CVSS: 5.0EPSS: 0%CPEs: 30EXPL: 1

Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows and facilitate phishing attacks, aka the "Dialog Box Spoofing Vulnerability." • https://www.exploit-db.com/exploits/589 http://secunia.com/advisories/12712 http://secunia.com/multiple_browsers_dialog_box_spoofing_test http://secunia.com/multiple_browsers_form_field_focus_test http://www.mozilla.org/security/announce/mfsa2005-05.html http://www.redhat.com/support/errata/RHSA-2005-323.html http://www.redhat.com/support/errata/RHSA-2005-335.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18864 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg •

CVSS: 5.0EPSS: 16%CPEs: 30EXPL: 2

Firefox before 1.0 and Mozilla before 1.7.5 allow inactive (background) tabs to focus on input being entered in the active tab, as originally reported using form fields, which allows remote attackers to steal sensitive data that is intended for other sites, which could facilitate phishing attacks. • https://www.exploit-db.com/exploits/589 http://secunia.com/advisories/12712 http://secunia.com/multiple_browsers_dialog_box_spoofing_test http://secunia.com/multiple_browsers_form_field_focus_test http://www.mozilla.org/security/announce/mfsa2005-05.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17789 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100053 •

CVSS: 5.0EPSS: 1%CPEs: 43EXPL: 4

Mozilla allows remote attackers to cause a denial of service (application crash from null dereference or infinite loop) via a web page that contains a (1) TEXTAREA, (2) INPUT, (3) FRAMESET or (4) IMG tag followed by a null character and some trailing characters, as demonstrated by mangleme. • http://lcamtuf.coredump.cx/mangleme/gallery http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html http://marc.info/?l=bugtraq&m=109811406620511&w=2 http://securitytracker.com/id?1011810 http://www.redhat.com/support/errata/RHSA-2005-323.html http://www.securityfocus.com/bid/11439 https://exchange.xforce.ibmcloud.com/vulnerabilities/17805 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10227 •

CVSS: 5.0EPSS: 1%CPEs: 27EXPL: 2

Mozilla allows remote attackers to cause a denial of service (application crash from invalid memory access) via an "unusual combination of visual elements," including several large MARQUEE tags with large height parameters, as demonstrated by mangleme. • http://lcamtuf.coredump.cx/mangleme/gallery http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html http://marc.info/?l=bugtraq&m=109811406620511&w=2 http://securitytracker.com/id?1011810 http://www.securityfocus.com/bid/11440 •