Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0593

Опубликовано: 04 мар. 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 2.6

Описание

Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.

РелизСтатусПримечание
dapper

released

1.7.12-1.1ubuntu2
devel

DNE

edgy

released

1.7.12-1.1ubuntu2
feisty

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 78%
0.01252
Низкий

2.6 Low

CVSS2

Связанные уязвимости

redhat
больше 20 лет назад

Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.

nvd
больше 20 лет назад

Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.

debian
больше 20 лет назад

Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers ...

github
около 3 лет назад

Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.

EPSS

Процентиль: 78%
0.01252
Низкий

2.6 Low

CVSS2