{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2006-2784", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20060602 rPSA-2006-0091-1 firefox thunderbird", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/435795/100/0/threaded" }, { "name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-36.html", "refsource" : "CONFIRM", "url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-36.html" }, { "name" : "DSA-1118", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-1118" }, { "name" : "DSA-1120", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-1120" }, { "name" : "DSA-1134", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2006/dsa-1134" }, { "name" : "GLSA-200606-12", "refsource" : "GENTOO", "url" : "http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml" }, { "name" : "HPSBUX02153", "refsource" : "HP", "url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name" : "SSRT061181", "refsource" : "HP", "url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded" }, { "name" : "MDKSA-2006:143", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143" }, { "name" : "MDKSA-2006:145", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145" }, { "name" : "RHSA-2006:0578", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2006-0578.html" }, { "name" : "RHSA-2006:0610", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2006-0610.html" }, { "name" : "RHSA-2006:0611", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2006-0611.html" }, { "name" : "RHSA-2006:0609", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2006-0609.html" }, { "name" : "RHSA-2006:0594", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2006-0594.html" }, { "name" : "SUSE-SA:2006:035", "refsource" : "SUSE", "url" : "http://www.novell.com/linux/security/advisories/2006_35_mozilla.html" }, { "name" : "USN-296-1", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/296-1/" }, { "name" : "USN-296-2", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/296-2/" }, { "name" : "USN-297-3", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/297-3/" }, { "name" : "USN-323-1", "refsource" : "UBUNTU", "url" : "https://usn.ubuntu.com/323-1/" }, { "name" : "18228", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/18228" }, { "name" : "oval:org.mitre.oval:def:9768", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9768" }, { "name" : "ADV-2006-2106", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2006/2106" }, { "name" : "ADV-2006-3748", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2006/3748" }, { "name" : "ADV-2008-0083", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2008/0083" }, { "name" : "1016202", "refsource" : "SECTRACK", "url" : "http://securitytracker.com/id?1016202" }, { "name" : "20376", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/20376" }, { "name" : "20561", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/20561" }, { "name" : "21134", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21134" }, { "name" : "21183", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21183" }, { "name" : "21176", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21176" }, { "name" : "21178", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21178" }, { "name" : "21188", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21188" }, { "name" : "21210", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21210" }, { "name" : "21269", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21269" }, { "name" : "21270", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21270" }, { "name" : "21336", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21336" }, { "name" : "21324", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21324" }, { "name" : "21532", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21532" }, { "name" : "21631", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/21631" }, { "name" : "22066", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/22066" }, { "name" : "mozilla-pluginspage-code-execution(26847)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26847" } ] } }