4 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Flock Browser 3.x before 3.0.0.4114 allows remote attackers to inject arbitrary web script or HTML via a crafted RSS feed. Vulnerabilidad de ejecución de comandos en sitios cruzados en Flock Browser v3.x antes de v3.0.0.4114 permite a atacantes remotos ejecutar HTML o secuencias de comandos web de su elección a través de un feed RSS modificado para tal fin. • http://flock.com/security http://www.securityfocus.com/archive/1/513701/100/0/threaded http://www.securityfocus.com/bid/43225 https://exchange.xforce.ibmcloud.com/vulnerabilities/61820 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in Flock Browser 3.0.0.3989 allows remote attackers to inject arbitrary web script or HTML via a crafted bookmark. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en Flock Browser v3.0.0.3989 permite a atacantes remotos inyectar HTML o scripts web a través de un bookmark modificado para tal fin. • https://www.exploit-db.com/exploits/34500 http://archives.neohapsis.com/archives/bugtraq/2010-09/0111.html http://flock.com/security http://lostmon.blogspot.com/2010/08/flock-browser-3003989-malformed.html http://www.securityfocus.com/bid/42556 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Mozilla Firefox 3.5.1 and SeaMonkey 1.1.17, and Flock 2.5.1, allow context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by a visit to a file: document written by the attacker. Mozilla Firefox v3.5.1, SeaMonkey v1.1.17 y Flock v2.5.1 permiten falsificar a atacantes remotos dependiendo del contexto la barra de direcciones a través de un window.open con una URI relativa, que muestra una URL de tipo File: arbitraria que una victima haya visitado anteriormente, como se demuestra visitando un documento de tipo file: escrito por el atacante. • http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html https://exchange.xforce.ibmcloud.com/vulnerabilities/53010 •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 1

Flock beta 1 0.7 allows remote attackers to cause a denial of service (application crash) via a web page that contains a large number of nested marquee tags, a related issue to CVE-2006-2723. Flock beta 1 0.7 permite a atacantes remotos provocar una denegación de servicio (cierre de aplicación) mediante una página web que contiene un gran número de etiquetas de marquesina (marquee) anidadas, un problema relacionado con CVE-2006-2723. • http://www.securityfocus.com/archive/1/438144/100/100/threaded http://www.securityfocus.com/archive/1/438365/100/100/threaded http://www.securityfocus.com/archive/1/439064/100/100/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26898 • CWE-20: Improper Input Validation •