5
CVSSv2

CVE-2006-6077

Published: 24/11/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and previous versions; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for which the user stored a password, which allows remote malicious users to obtain passwords via a password INPUT element on a different web page located on the web site intended for this password.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 1.5.0.3

mozilla firefox 1.5.0.4

mozilla firefox 1.5.0.5

mozilla firefox

mozilla firefox 1.5

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.2

mozilla firefox 2.0

netscape navigator 8.1.2

mozilla firefox 1.5.0.6

mozilla firefox 1.5.0.7

Vendor Advisories

Several flaws have been found that could be used to perform Cross-site scripting attacks A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages (CVE-2006-6077, CVE-2007-0780, CVE-2007-0800, CVE-2007-0981, CVE-2007-0995, CVE-2007-0996) ...
USN-428-1 fixed vulnerabilities in Firefox 15 However, changes to library paths caused applications depending on libnss3 to fail to start up This update fixes the problem ...
Several remote vulnerabilities have been discovered in Mozilla Firefox This will be the last security update of Mozilla-based products for the oldstable (sarge) distribution of Debian We recommend to upgrade to stable (etch) as soon as possible The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2007-1 ...
Mozilla Foundation Security Advisory 2007-02 Improvements to help protect against Cross-Site Scripting attacks Announced February 23, 2007 Reporter various Impact Low Products Firefox, SeaMonkey Fixed in ...

References

NVD-CWE-Otherhttp://www.info-svc.com/news/11-21-2006/https://bugzilla.mozilla.org/show_bug.cgi?id=360493http://www.securityfocus.com/bid/21240http://securitytracker.com/id?1017271http://secunia.com/advisories/23046http://secunia.com/advisories/23108http://www.info-svc.com/news/11-21-2006/rcsr1/http://www.mozilla.org/security/announce/2007/mfsa2007-02.htmlhttps://issues.rpath.com/browse/RPL-1081https://issues.rpath.com/browse/RPL-1103http://fedoranews.org/cms/node/2713http://fedoranews.org/cms/node/2728http://security.gentoo.org/glsa/glsa-200703-04.xmlhttp://www.gentoo.org/security/en/glsa/glsa-200703-08.xmlhttp://www.redhat.com/support/errata/RHSA-2007-0079.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0077.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0078.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0097.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0108.htmlhttp://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.htmlhttp://www.ubuntu.com/usn/usn-428-1http://www.securityfocus.com/bid/22694http://secunia.com/advisories/24238http://secunia.com/advisories/24287http://secunia.com/advisories/24290http://secunia.com/advisories/24205http://secunia.com/advisories/24328http://secunia.com/advisories/24333http://secunia.com/advisories/24343http://secunia.com/advisories/24320http://secunia.com/advisories/24293http://secunia.com/advisories/24393http://secunia.com/advisories/24395http://secunia.com/advisories/24384http://secunia.com/advisories/24437ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.aschttp://secunia.com/advisories/24650http://www.debian.org/security/2007/dsa-1336http://www.mandriva.com/security/advisories?name=MDKSA-2007:050ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.aschttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131http://www.novell.com/linux/security/advisories/2007_22_mozilla.htmlhttp://secunia.com/advisories/24457http://secunia.com/advisories/24342http://secunia.com/advisories/25588http://www.vupen.com/english/advisories/2007/0718http://www.vupen.com/english/advisories/2006/4662http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742https://exchange.xforce.ibmcloud.com/vulnerabilities/30470https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10031http://www.securityfocus.com/archive/1/461809/100/0/threadedhttp://www.securityfocus.com/archive/1/461336/100/0/threadedhttp://www.securityfocus.com/archive/1/455148/100/0/threadedhttp://www.securityfocus.com/archive/1/455073/100/0/threadedhttp://www.securityfocus.com/archive/1/454982/100/0/threadedhttp://www.securityfocus.com/archive/1/452463/100/0/threadedhttp://www.securityfocus.com/archive/1/452440/100/0/threadedhttp://www.securityfocus.com/archive/1/452431/100/0/threadedhttp://www.securityfocus.com/archive/1/452382/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/428-1/