5 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Flock Browser 3.x before 3.0.0.4114 allows remote attackers to inject arbitrary web script or HTML via a crafted RSS feed. Vulnerabilidad de ejecución de comandos en sitios cruzados en Flock Browser v3.x antes de v3.0.0.4114 permite a atacantes remotos ejecutar HTML o secuencias de comandos web de su elección a través de un feed RSS modificado para tal fin. • http://flock.com/security http://www.securityfocus.com/archive/1/513701/100/0/threaded http://www.securityfocus.com/bid/43225 https://exchange.xforce.ibmcloud.com/vulnerabilities/61820 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in Flock Browser 3.0.0.3989 allows remote attackers to inject arbitrary web script or HTML via a crafted bookmark. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en Flock Browser v3.0.0.3989 permite a atacantes remotos inyectar HTML o scripts web a través de un bookmark modificado para tal fin. • https://www.exploit-db.com/exploits/34500 http://archives.neohapsis.com/archives/bugtraq/2010-09/0111.html http://flock.com/security http://lostmon.blogspot.com/2010/08/flock-browser-3003989-malformed.html http://www.securityfocus.com/bid/42556 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 225EXPL: 1

The protocolIs function in platform/KURLGoogle.cpp in WebCore in WebKit before r55822, as used in Google Chrome before 4.1.249.1036 and Flock Browser 3.x before 3.0.0.4112, does not properly handle whitespace at the beginning of a URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted javascript: URL, as demonstrated by a \x00javascript:alert sequence. La función protocolIs en el archivo platform/KURLGoogle.cpp en WebCore en WebKit anterior a r55822, tal y como es usado en Chrome de Google anterior a versión 4.1.249.1036 y Flock Browser versiones 3.x anteriores a 3.0.0.4112, no maneja apropiadamente un espacio en blanco al principio de una dirección URL, lo que permite a los atacantes remotos conducir ataques de tipo cross-site scripting (XSS) por medio de una URL javascript: especialmente diseñada, como es demostrado por una secuencia \x00javascript:alert. • http://code.google.com/p/chromium/issues/detail?id=37383 http://codereview.chromium.org/858001 http://flock.com/security http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/43068 http://src.chromium.org/viewvc/chrome?view=rev&revision=41244 http://www.vupen.com/english/advisories/2011/0212 https://bugs.webkit.org/show_bug.cgi?id=35948 https://oval.cise • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Mozilla Firefox 3.5.1 and SeaMonkey 1.1.17, and Flock 2.5.1, allow context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by a visit to a file: document written by the attacker. Mozilla Firefox v3.5.1, SeaMonkey v1.1.17 y Flock v2.5.1 permiten falsificar a atacantes remotos dependiendo del contexto la barra de direcciones a través de un window.open con una URI relativa, que muestra una URL de tipo File: arbitraria que una victima haya visitado anteriormente, como se demuestra visitando un documento de tipo file: escrito por el atacante. • http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html https://exchange.xforce.ibmcloud.com/vulnerabilities/53010 •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 1

Flock beta 1 0.7 allows remote attackers to cause a denial of service (application crash) via a web page that contains a large number of nested marquee tags, a related issue to CVE-2006-2723. Flock beta 1 0.7 permite a atacantes remotos provocar una denegación de servicio (cierre de aplicación) mediante una página web que contiene un gran número de etiquetas de marquesina (marquee) anidadas, un problema relacionado con CVE-2006-2723. • http://www.securityfocus.com/archive/1/438144/100/100/threaded http://www.securityfocus.com/archive/1/438365/100/100/threaded http://www.securityfocus.com/archive/1/439064/100/100/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26898 • CWE-20: Improper Input Validation •