5
CVSSv2

CVE-2005-0590

Published: 02/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The installation confirmation dialog in Firefox prior to 1.0.1, Thunderbird prior to 1.0.1, and Mozilla prior to 1.7.6 allows remote malicious users to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 0.8

mozilla firefox 0.9

mozilla mozilla 1.4.1

mozilla mozilla 1.4

mozilla mozilla 1.6

mozilla mozilla 1.7

mozilla thunderbird 0.6

mozilla thunderbird 0.7

mozilla firefox 0.9.3

mozilla firefox 1.0

mozilla mozilla 1.5

mozilla firefox 0.10

mozilla firefox 0.10.1

mozilla mozilla 1.3

mozilla mozilla 1.7.5

mozilla thunderbird 0.4

mozilla thunderbird 0.5

mozilla thunderbird 0.9

mozilla thunderbird 1.0

mozilla mozilla 1.7.2

mozilla mozilla 1.7.3

mozilla thunderbird 0.2

mozilla thunderbird 0.3

mozilla thunderbird 0.7.3

mozilla thunderbird 0.8

mozilla firefox 0.9.1

mozilla firefox 0.9.2

mozilla mozilla 1.5.1

mozilla mozilla 1.7.1

mozilla thunderbird 0.1

mozilla thunderbird 0.7.1

mozilla thunderbird 0.7.2

Vendor Advisories

Synopsis Mozilla security update Type/Severity Security Advisory: Important Topic Updated Mozilla packages that fix various security bugs are now availableThis update has been rated as having Important security impact by the RedHat Security Response Team Description Mozilla is an open sou ...
Synopsis firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix various bugs are now availableThis update has been rated as having critical security impact by the RedHat Security Response Team Description Mozilla Firefox is an open source ...
USN-149-1 fixed some vulnerabilities in the Ubuntu 504 (Hoary Hedgehog) version of Firefox The version shipped with Ubuntu 410 (Warty Warthog) is also vulnerable to these flaws, so it needs to be upgraded as well Please see ...