René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

147 lines
4.0 KiB
JSON

{
"id": "CVE-2006-1725",
"sourceIdentifier": "secalert@redhat.com",
"published": "2006-04-14T10:02:00.000",
"lastModified": "2018-10-18T16:34:11.890",
"vulnStatus": "Modified",
"evaluatorSolution": "Fixed in: \r\n Firefox 1.5.0.2\r\n SeaMonkey 1.0.1",
"descriptions": [
{
"lang": "en",
"value": "Mozilla Firefox 1.5 before 1.5.0.2 and SeaMonkey before 1.0.1 causes certain windows to become translucent due to an interaction between XUL content windows and the history mechanism, which might allow user-assisted remote attackers to trick users into executing arbitrary code."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 2.6
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.5",
"versionEndExcluding": "1.5.0.2",
"matchCriteriaId": "04455349-5186-4BF4-8EE1-F4852B806F47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.1",
"matchCriteriaId": "976B9AFA-0129-480B-B226-892CECD59287"
}
]
}
]
}
],
"references": [
{
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-29.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/17516",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/1356",
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3748",
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0083",
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=327014",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25827",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1471",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}