iCab 2.9.8 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
References
Link | Resource |
---|---|
http://secunia.com/advisories/15477 | Exploit Patch Vendor Advisory |
http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/ | Exploit |
http://secunia.com/advisories/15477 | Exploit Patch Vendor Advisory |
http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/ | Exploit |
Configurations
History
20 Nov 2024, 23:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/15477 - Exploit, Patch, Vendor Advisory | |
References | () http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/ - Exploit |
Information
Published : 2005-07-13 04:00
Updated : 2024-11-20 23:59
NVD link : CVE-2005-2271
Mitre link : CVE-2005-2271
CVE.ORG link : CVE-2005-2271
JSON object : View
Products Affected
alexander_clauss
- icab
CWE