CVE-2005-2267
Published Jul 13, 2005
Last updated 7 years ago
Overview
- Description
- Firefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93C142C5-3A85-432B-80D6-2E7B1B4694F4" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2434FCE7-A50B-4527-9970-C7224B31141C" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5633FB6E-D623-49D4-9858-4E20E64DE458" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "429ECA02-DBCD-45FB-942C-CA4BC1BC8A72" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "567FF916-7DE0-403C-8528-7931A43E0D18" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "010B34F4-910E-4515-990B-8E72DF009578" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "778FAE0C-A5CF-4B67-93A9-1A803E3E699F" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7447185-7509-449D-8907-F30A42CF7EB5" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EDBAC37-9D08-44D1-B279-BC6ACF126CAF" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FFF89FA-2020-43CC-BACD-D66117B3DD26" } ], "operator": "OR" } ] } ]