2.6 CVE-2005-1576
Exploit Patch
The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows uses the Content-Type HTTP header to determine the file type, but saves the original file extension when "Save to Disk" is selected, which allows remote attackers to hide the real file types of downloaded files.
https://nvd.nist.gov/vuln/detail/CVE-2005-1576
Categories
CWE-NVD-Other
References
MISC Patch Exploit
http://secunia.com/secunia_research/2004-11/advisory/ Exploit Patch Vendor Advisory |
OSVDB Exploit
16432 Exploit Vendor Advisory |
SECUNIA Patch Exploit
12979 Exploit Patch Vendor Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:* |
Patch
Url |
---|
http://secunia.com/secunia_research/2004-11/advisory/ |
12979 |
Exploits
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
Other (github, ...)
Url |
---|
http://secunia.com/secunia_research/2004-11/advisory/ |
16432 |
12979 |
CAPEC
id | description | severity |
---|---|---|
No entry |
Sherlock® flash
Take a picture of your computer network in a few clicks !
The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.
