// For flags

CVE-2006-2784

 

Severity Score

5.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-06-02 CVE Reserved
  • 2006-06-02 CVE Published
  • 2023-12-13 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (43)
URL Date SRC
URL Date SRC
URL Date SRC
http://rhn.redhat.com/errata/RHSA-2006-0609.html 2018-10-18
http://secunia.com/advisories/20376 2018-10-18
http://secunia.com/advisories/20561 2018-10-18
http://secunia.com/advisories/21134 2018-10-18
http://secunia.com/advisories/21176 2018-10-18
http://secunia.com/advisories/21178 2018-10-18
http://secunia.com/advisories/21183 2018-10-18
http://secunia.com/advisories/21188 2018-10-18
http://secunia.com/advisories/21210 2018-10-18
http://secunia.com/advisories/21269 2018-10-18
http://secunia.com/advisories/21270 2018-10-18
http://secunia.com/advisories/21324 2018-10-18
http://secunia.com/advisories/21336 2018-10-18
http://secunia.com/advisories/21532 2018-10-18
http://secunia.com/advisories/21631 2018-10-18
http://secunia.com/advisories/22066 2018-10-18
http://www.debian.org/security/2006/dsa-1118 2018-10-18
http://www.debian.org/security/2006/dsa-1120 2018-10-18
http://www.debian.org/security/2006/dsa-1134 2018-10-18
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml 2018-10-18
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143 2018-10-18
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145 2018-10-18
http://www.mozilla.org/security/announce/2006/mfsa2006-36.html 2018-10-18
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html 2018-10-18
http://www.redhat.com/support/errata/RHSA-2006-0578.html 2018-10-18
http://www.redhat.com/support/errata/RHSA-2006-0594.html 2018-10-18
http://www.redhat.com/support/errata/RHSA-2006-0610.html 2018-10-18
http://www.redhat.com/support/errata/RHSA-2006-0611.html 2018-10-18
http://www.securityfocus.com/archive/1/446658/100/200/threaded 2018-10-18
http://www.vupen.com/english/advisories/2006/2106 2018-10-18
http://www.vupen.com/english/advisories/2006/3748 2018-10-18
http://www.vupen.com/english/advisories/2008/0083 2018-10-18
https://usn.ubuntu.com/296-1 2018-10-18
https://usn.ubuntu.com/296-2 2018-10-18
https://usn.ubuntu.com/297-3 2018-10-18
https://usn.ubuntu.com/323-1 2018-10-18
https://access.redhat.com/security/cve/CVE-2006-2784 2006-07-29
https://bugzilla.redhat.com/show_bug.cgi?id=1618118 2006-07-29
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 1.5.0.3
Search vendor "Mozilla" for product "Firefox" and version " <= 1.5.0.3"
-
Affected