CVE-2005-2703
Published Sep 23, 2005
Last updated 7 years ago
Overview
- Description
- Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to modify HTTP headers of XML HTTP requests via XMLHttpRequest, and possibly use the client to exploit vulnerabilities in servers or proxies, including HTTP request smuggling and HTTP request splitting.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9216BBE-9C9B-40F6-BB64-D20072344A38", "versionEndIncluding": "1.0.6" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "778FAE0C-A5CF-4B67-93A9-1A803E3E699F" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7447185-7509-449D-8907-F30A42CF7EB5" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EDBAC37-9D08-44D1-B279-BC6ACF126CAF" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FFF89FA-2020-43CC-BACD-D66117B3DD26" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "834BB391-5EB5-43A8-980A-D305EDAE6FA7" }, { "criteria": "cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60B8BE80-E9C1-40AE-991C-437F10D81E28", "versionEndIncluding": "1.7.11" }, { "criteria": "cpe:2.3:a:mozilla:mozilla_suite:1.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B220F04-0B11-4171-8E1E-1F01668661C8" }, { "criteria": "cpe:2.3:a:mozilla:mozilla_suite:1.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4751BA65-0CEF-46B8-A15F-A86F411890B0" }, { "criteria": "cpe:2.3:a:mozilla:mozilla_suite:1.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95047540-D109-494F-930A-D6593EDE00C9" }, { "criteria": "cpe:2.3:a:mozilla:mozilla_suite:1.7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0846804-2FA2-4D78-B3DD-67E5363B13C6" } ], "operator": "OR" } ] } ]