U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2005-0233

Change History

Modified Analysis by NIST 2/28/2022 12:41:49 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
     *cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*
     *cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:* versions up to (excluding) 1.7.6
     *cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*
     *cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* versions up to (including) 7.54
     *cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Removed CWE
NIST NVD-CWE-Other

								
						
Changed Reference Type
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html Exploit, Vendor Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html Broken Link, Exploit, Vendor Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=110782704923280&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=110782704923280&w=2 Mailing List
Changed Reference Type
http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml Exploit, Patch, Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml Exploit, Patch, Third Party Advisory, Vendor Advisory
Changed Reference Type
http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml Exploit, Patch, Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml Exploit, Patch, Third Party Advisory, Vendor Advisory
Changed Reference Type
http://www.mozilla.org/security/announce/mfsa2005-29.html Exploit, Patch, Vendor Advisory
http://www.mozilla.org/security/announce/mfsa2005-29.html Exploit, Patch, Third Party Advisory, Vendor Advisory
Changed Reference Type
http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html Exploit, Patch, Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html Broken Link, Exploit, Patch, Vendor Advisory
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2005-176.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2005-176.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2005-384.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2005-384.html Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/12461 No Types Assigned
http://www.securityfocus.com/bid/12461 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.shmoo.com/idn Exploit, Vendor Advisory
http://www.shmoo.com/idn Broken Link, Exploit, Vendor Advisory
Changed Reference Type
http://www.shmoo.com/idn/homograph.txt Exploit, Vendor Advisory
http://www.shmoo.com/idn/homograph.txt Broken Link, Exploit, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029 Tool Signature
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229 Tool Signature