mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
100 lines
3.0 KiB
JSON
100 lines
3.0 KiB
JSON
![]() |
{
|
||
|
"CVE_data_meta" : {
|
||
|
"ASSIGNER" : "cve@mitre.org",
|
||
|
"ID" : "CVE-2005-0233",
|
||
|
"STATE" : "PUBLIC"
|
||
|
},
|
||
|
"affects" : {
|
||
|
"vendor" : {
|
||
|
"vendor_data" : [
|
||
|
{
|
||
|
"product" : {
|
||
|
"product_data" : [
|
||
|
{
|
||
|
"product_name" : "n/a",
|
||
|
"version" : {
|
||
|
"version_data" : [
|
||
|
{
|
||
|
"version_value" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"vendor_name" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
"data_format" : "MITRE",
|
||
|
"data_type" : "CVE",
|
||
|
"data_version" : "4.0",
|
||
|
"description" : {
|
||
|
"description_data" : [
|
||
|
{
|
||
|
"lang" : "eng",
|
||
|
"value" : "The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks."
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"problemtype" : {
|
||
|
"problemtype_data" : [
|
||
|
{
|
||
|
"description" : [
|
||
|
{
|
||
|
"lang" : "eng",
|
||
|
"value" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"references" : {
|
||
|
"reference_data" : [
|
||
|
{
|
||
|
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://marc.info/?l=bugtraq&m=110782704923280&w=2"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.shmoo.com/idn"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.shmoo.com/idn/homograph.txt"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.mozilla.org/security/announce/mfsa2005-29.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.redhat.com/support/errata/RHSA-2005-176.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.redhat.com/support/errata/RHSA-2005-384.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/bid/12461"
|
||
|
},
|
||
|
{
|
||
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029"
|
||
|
},
|
||
|
{
|
||
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229"
|
||
|
},
|
||
|
{
|
||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|