![]() Name: The remote Mandrake Linux host is missing one or more security updates. If you want to see a complete summary for this CPE, please contact us. Name : Debian Security Advisory DSA 1401-1 (iceape) Name : Debian Security Advisory DSA 1396-1 (icedove) Name : Debian Security Advisory DSA 1392-1 (xulrunner) Name : Debian Security Advisory DSA 1051-1 (mozilla-thunderbird) Name : Debian Security Advisory DSA 1046-1 (mozilla) Name : Debian Security Advisory DSA 1044-1 (mozilla-firefox) Name : Gentoo Security Advisory GLSA 200604-18 (mozilla) Name : Gentoo Security Advisory GLSA 200604-12 (mozilla-firefox) #Netscape navigator mac 1.0 sale updateName : SuSE Update for MozillaFirefox,mozilla,seamonkey SUSE-SA:2007:057 Name : Fedora Update for firefox FEDORA-2007-2664įile : nvt/gb_fedora_2007_2664_firefox_fc7.nasl Name : Ubuntu Update for mozilla-thunderbird, thunderbird vulnerabilities USN-536-1 Name : Ubuntu Update for firefox vulnerabilities USN-535-1 Name : Mandriva Update for mozilla-firefox MDKSA-2007:202 (mozilla-firefox)įile : nvt/gb_mandriva_MDKSA_2007_202.nasl Name : SLES9: Security update for Mozilla The POP3 mail client in Mozilla 1.0 and earlier, and Netscape Communicator 4.7 and earlier, allows remote attackers to cause a denial of service (no new mail) via a mail message containing a dot (.) at a newline, which is interpreted as the end of the message. Also, it has been independently reported that Netscape 8.1 does not have this issue. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox. Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. ![]() Mozilla Firefox 1.5.0.4, 2.0.x before 2.0.0.8, Mozilla Suite 1.7.13, Mozilla SeaMonkey 1.0.2 and other versions before 1.1.5, and Netscape 8.1 and earlier allow user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |