CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
99.7%
USN-149-1 fixed some vulnerabilities in the Ubuntu 5.04 (Hoary
Hedgehog) version of Firefox. The version shipped with Ubuntu 4.10
(Warty Warthog) is also vulnerable to these flaws, so it needs to be
upgraded as well. Please see
<http://www.ubuntulinux.org/support/documentation/usn/usn-149-1>
for the original advisory.
This update also fixes several older vulnerabilities; Some of them
could be exploited to execute arbitrary code with full user privileges
if the user visited a malicious web site. (MFSA-2005-01 to
MFSA-2005-44; please see the following web site for details:
<http://www.mozilla.org/projects/security/known-vulnerabilities.html>)
ubuntu.com/security/CVE-2004-1156
ubuntu.com/security/CVE-2004-1381
ubuntu.com/security/CVE-2005-0141
ubuntu.com/security/CVE-2005-0142
ubuntu.com/security/CVE-2005-0143
ubuntu.com/security/CVE-2005-0144
ubuntu.com/security/CVE-2005-0145
ubuntu.com/security/CVE-2005-0146
ubuntu.com/security/CVE-2005-0147
ubuntu.com/security/CVE-2005-0150
ubuntu.com/security/CVE-2005-0230
ubuntu.com/security/CVE-2005-0231
ubuntu.com/security/CVE-2005-0232
ubuntu.com/security/CVE-2005-0233
ubuntu.com/security/CVE-2005-0255
ubuntu.com/security/CVE-2005-0399
ubuntu.com/security/CVE-2005-0401
ubuntu.com/security/CVE-2005-0402
ubuntu.com/security/CVE-2005-0578
ubuntu.com/security/CVE-2005-0584
ubuntu.com/security/CVE-2005-0585
ubuntu.com/security/CVE-2005-0586
ubuntu.com/security/CVE-2005-0587
ubuntu.com/security/CVE-2005-0588
ubuntu.com/security/CVE-2005-0589
ubuntu.com/security/CVE-2005-0590
ubuntu.com/security/CVE-2005-0591
ubuntu.com/security/CVE-2005-0592
ubuntu.com/security/CVE-2005-0593
ubuntu.com/security/CVE-2005-0752
ubuntu.com/security/CVE-2005-0989
ubuntu.com/security/CVE-2005-1153
ubuntu.com/security/CVE-2005-1154
ubuntu.com/security/CVE-2005-1155
ubuntu.com/security/CVE-2005-1156
ubuntu.com/security/CVE-2005-1157
ubuntu.com/security/CVE-2005-1158
ubuntu.com/security/CVE-2005-1159
ubuntu.com/security/CVE-2005-1160
ubuntu.com/security/CVE-2005-1531
ubuntu.com/security/CVE-2005-1532
ubuntu.com/security/CVE-2005-1937
ubuntu.com/security/CVE-2005-2260
ubuntu.com/security/CVE-2005-2261
ubuntu.com/security/CVE-2005-2262
ubuntu.com/security/CVE-2005-2263
ubuntu.com/security/CVE-2005-2264
ubuntu.com/security/CVE-2005-2265
ubuntu.com/security/CVE-2005-2266
ubuntu.com/security/CVE-2005-2267
ubuntu.com/security/CVE-2005-2268
ubuntu.com/security/CVE-2005-2269
ubuntu.com/security/CVE-2005-2270
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
99.7%