Vulnerability Details : CVE-2005-0232
Potential exploit
Firefox 1.0 allows remote attackers to modify Boolean configuration parameters for the about:config site by using a plugin such as Flash, and the -moz-opacity filter, to display the about:config site then cause the user to double-click at a certain screen position, aka "Fireflashing."
Products affected by CVE-2005-0232
- cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-0232
1.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0232
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:P/A:N |
4.9
|
2.9
|
NIST |
References for CVE-2005-0232
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/19266
-
http://www.mozilla.org/security/announce/mfsa2005-27.html
Plugins can be used to load privileged content — MozillaVendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-323.html
Patch;Vendor Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=280664
Vendor Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml
Mozilla Firefox: Various vulnerabilities (GLSA 200503-10) — Gentoo securityPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-384.html
Support
-
http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml
Mozilla Suite: Multiple vulnerabilities (GLSA 200503-30) — Gentoo securityPatch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=110781055630856&w=2
-
http://www.redhat.com/support/errata/RHSA-2005-176.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10967
404 Not Found
-
http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html
Security - Support | SUSEPatch;Vendor Advisory
-
http://www.mikx.de/fireflashing/
Mikx.de | Ein Mikx aus Liebe und AbenteuerExploit
Jump to