CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
68.8%
Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox | * | cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* |
mozilla | seamonkey | * | cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* |
mozilla | thunderbird | * | cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 6.06 | cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 7.10 | cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 8.04 | cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 8.10 | cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
debian | debian_linux | 5.0 | cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* |
secunia.com/advisories/33184
secunia.com/advisories/33188
secunia.com/advisories/33189
secunia.com/advisories/33203
secunia.com/advisories/33204
secunia.com/advisories/33205
secunia.com/advisories/33216
secunia.com/advisories/33231
secunia.com/advisories/33408
secunia.com/advisories/33415
secunia.com/advisories/33421
secunia.com/advisories/33433
secunia.com/advisories/33434
secunia.com/advisories/33523
secunia.com/advisories/33547
secunia.com/advisories/34501
secunia.com/advisories/35080
sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
www.debian.org/security/2009/dsa-1696
www.debian.org/security/2009/dsa-1697
www.debian.org/security/2009/dsa-1704
www.debian.org/security/2009/dsa-1707
www.mandriva.com/security/advisories?name=MDVSA-2008:244
www.mandriva.com/security/advisories?name=MDVSA-2008:245
www.mandriva.com/security/advisories?name=MDVSA-2009:012
www.mozilla.org/security/announce/2008/mfsa2008-66.html
www.redhat.com/support/errata/RHSA-2008-1036.html
www.redhat.com/support/errata/RHSA-2008-1037.html
www.redhat.com/support/errata/RHSA-2009-0002.html
www.securityfocus.com/bid/32882
www.securitytracker.com/id?1021426
www.ubuntu.com/usn/usn-690-2
www.ubuntu.com/usn/usn-701-1
www.ubuntu.com/usn/usn-701-2
www.vupen.com/english/advisories/2009/0977
bugzilla.mozilla.org/show_bug.cgi?id=425046
bugzilla.mozilla.org/show_bug.cgi?id=460803
exchange.xforce.ibmcloud.com/vulnerabilities/47414
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040
usn.ubuntu.com/690-1/