The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation42 reference(s) from NVD