3 results (0.002 seconds)

CVSS: 5.8EPSS: 1%CPEs: 1EXPL: 2

Visual truncation vulnerability in Galeon 2.0.1 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication. Vulnerabilidad de truncamiento visual en Galeon 2.0.1 permite a atacantes remotos envenenar la barra de dirección y posiblemente realizar ataques de phishing a través de un nombre de host largo, el cual está truncado después de un cierto número de caractéres, como se demostró con la utilización de un ataque de phishing utilizando HTTP Basic Authentication. • http://osvdb.org/43467 http://testing.bitsploit.de/test.html http://www.0x000000.com/?i=334 http://www.securityfocus.com/bid/24352 https://exchange.xforce.ibmcloud.com/vulnerabilities/34983 •

CVSS: 2.6EPSS: 0%CPEs: 12EXPL: 1

Mozilla 1.1 and earlier, and Mozilla-based browsers such as Netscape and Galeon, set the document referrer too quickly in certain situations when a new page is being loaded, which allows web pages to determine the next page that is being visited, including manually entered URLs, using the onunload handler. • http://bugzilla.mozilla.org/show_bug.cgi?id=145579 http://marc.info/?l=bugtraq&m=103176760004720&w=2 http://www.iss.net/security_center/static/10084.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:075 http://www.redhat.com/support/errata/RHSA-2002-192.html http://www.redhat.com/support/errata/RHSA-2003-046.html http://www.securityfocus.com/bid/5694 https://access.redhat.com/security/cve/CVE-2002-1126 https://bugzilla.redhat.com/show_bug.cgi?id= •

CVSS: 5.0EPSS: 1%CPEs: 10EXPL: 1

Netscape 6 and Mozilla 1.0 RC1 and earlier allows remote attackers to determine the existence of files on the client system via a LINK element in a Cascading Style Sheet (CSS) page that causes an HTTP redirect. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000490 http://online.securityfocus.com/archive/1/270249 http://www.iss.net/security_center/static/8977.php http://www.redhat.com/support/errata/RHSA-2002-192.html http://www.redhat.com/support/errata/RHSA-2003-046.html http://www.securityfocus.com/bid/4640 https://access.redhat.com/security/cve/CVE-2002-0594 https://bugzilla.redhat.com/show_bug.cgi?id=1616782 •