CVE-2005-1575

The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows allows remote attackers to hide the real file types of downloaded files via the Content-Type HTTP header and a filename containing whitespace, dots, or ASCII byte 160.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:57

Type Values Removed Values Added
References () http://secunia.com/advisories/12979 - Vendor Advisory () http://secunia.com/advisories/12979 - Vendor Advisory
References () http://secunia.com/secunia_research/2004-11/advisory/ - Vendor Advisory () http://secunia.com/secunia_research/2004-11/advisory/ - Vendor Advisory
References () http://www.osvdb.org/16431 - Vendor Advisory () http://www.osvdb.org/16431 - Vendor Advisory

Information

Published : 2005-05-14 04:00

Updated : 2024-11-20 23:57


NVD link : CVE-2005-1575

Mitre link : CVE-2005-1575

CVE.ORG link : CVE-2005-1575


JSON object : View

Products Affected

mozilla

  • firefox