mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
112 lines
3.9 KiB
JSON
112 lines
3.9 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2005-0590",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long \"user:pass\" sequence in the URL, which appears before the real hostname."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "12659",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/12659"
|
|
},
|
|
{
|
|
"name": "19823",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/19823"
|
|
},
|
|
{
|
|
"name": "http://www.mozilla.org/security/announce/mfsa2005-17.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.mozilla.org/security/announce/mfsa2005-17.html"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:100041",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100041"
|
|
},
|
|
{
|
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=268059",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=268059"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:10010",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10010"
|
|
},
|
|
{
|
|
"name": "RHSA-2005:176",
|
|
"refsource": "REDHAT",
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-176.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2005:384",
|
|
"refsource": "REDHAT",
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-384.html"
|
|
},
|
|
{
|
|
"name": "GLSA-200503-30",
|
|
"refsource": "GENTOO",
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml"
|
|
},
|
|
{
|
|
"name": "GLSA-200503-10",
|
|
"refsource": "GENTOO",
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml"
|
|
},
|
|
{
|
|
"name": "SUSE-SA:2006:022",
|
|
"refsource": "SUSE",
|
|
"url": "http://www.novell.com/linux/security/advisories/2006_04_25.html"
|
|
}
|
|
]
|
|
}
|
|
} |