CVE-2005-2703

N/A Unknown
Published: September 23, 2005 Modified: April 16, 2026
View on NVD

Description

Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to modify HTTP headers of XML HTTP requests via XMLHttpRequest, and possibly use the client to exploit vulnerabilities in servers or proxies, including HTTP request smuggling and HTTP request splitting.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/16911
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/16917
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/16977
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/17014
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/17026
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/17042
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/17090
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/17149
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/17263
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/17284
Source: secalert@redhat.com
Vendor Advisory
http://securitytracker.com/id?1014954
Source: secalert@redhat.com
http://www.securityfocus.com/bid/14923
Source: secalert@redhat.com
http://www.securityfocus.com/bid/15495
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-200-1
Source: secalert@redhat.com
http://secunia.com/advisories/16911
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/16917
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/16977
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17014
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17026
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17042
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17090
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17149
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17263
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/17284
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1014954
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-838
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-866
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2005/dsa-868
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2005:169
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2005:170
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2005:174
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/mfsa2005-58.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-785.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-789.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2005-791.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/14923
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15495
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-200-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/1824
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/22376
Source: af854a3a-2127-422b-91ae-364da2661108

62 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.7%
89th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla