// For flags

CVE-2006-2786

 

Severity Score

2.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-06-02 CVE Reserved
  • 2006-06-02 CVE Published
  • 2023-12-13 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (49)
URL Tag Source
http://secunia.com/advisories/20376 Third Party Advisory
http://secunia.com/advisories/20382 Third Party Advisory
http://secunia.com/advisories/20561 Third Party Advisory
http://secunia.com/advisories/20709 Third Party Advisory
http://secunia.com/advisories/21134 Third Party Advisory
http://secunia.com/advisories/21176 Third Party Advisory
http://secunia.com/advisories/21178 Third Party Advisory
http://secunia.com/advisories/21183 Third Party Advisory
http://secunia.com/advisories/21188 Third Party Advisory
http://secunia.com/advisories/21269 Third Party Advisory
http://secunia.com/advisories/21270 Third Party Advisory
http://secunia.com/advisories/21324 Third Party Advisory
http://secunia.com/advisories/21336 Third Party Advisory
http://secunia.com/advisories/21532 Third Party Advisory
http://secunia.com/advisories/21631 Third Party Advisory
http://secunia.com/advisories/22065 Third Party Advisory
http://secunia.com/advisories/22066 Third Party Advisory
http://securitytracker.com/id?1016202 Vdb Entry
http://securitytracker.com/id?1016214 Vdb Entry
http://www.securityfocus.com/archive/1/435795/100/0/threaded Mailing List
http://www.securityfocus.com/bid/18228 Vdb Entry
http://www.vupen.com/english/advisories/2006/2106 Vdb Entry
http://www.vupen.com/english/advisories/2006/3748 Vdb Entry
http://www.vupen.com/english/advisories/2006/3749 Vdb Entry
http://www.vupen.com/english/advisories/2008/0083 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/26844 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9966 Signature
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 1.5.0.3
Search vendor "Mozilla" for product "Firefox" and version " <= 1.5.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 1.5.0.3
Search vendor "Mozilla" for product "Thunderbird" and version " <= 1.5.0.3"
-
Affected