Firefox before 1.0.1 allows remote attackers to spoof the (1) security and (2) download modal dialog boxes, which could be used to trick users into executing script or downloading and executing a file, aka "Firespoofing."
Link | Tags |
---|---|
http://www.mozilla.org/security/announce/mfsa2005-16.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18864 | vdb entry |
http://secunia.com/advisories/13786 | third party advisory |
http://www.mikx.de/firespoofing/ | exploit |
https://bugzilla.mozilla.org/show_bug.cgi?id=260560 | patch |
http://marc.info/?l=bugtraq&m=110547286002188&w=2 | mailing list |
http://www.securityfocus.com/bid/12234 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2005-176.html | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100042 | vdb entry signature |
http://www.redhat.com/support/errata/RHSA-2005-384.html | vendor advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml | patch vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10039 | vdb entry signature |
http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml | patch vendor advisory |
http://www.mikx.de/index.php?p=7 | vendor advisory |