Firefox before 1.0.5 and Mozilla before 1.7.9 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
http://secunia.com/advisories/15489
http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/
http://www.debian.org/security/2005/dsa-810
http://www.mozilla.org/security/announce/mfsa2005-54.html
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://www.novell.com/linux/security/advisories/2005_45_mozilla.html
http://www.redhat.com/support/errata/RHSA-2005-586.html
http://www.redhat.com/support/errata/RHSA-2005-587.html
http://www.securityfocus.com/bid/14242
http://www.vupen.com/english/advisories/2005/1075
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100005
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10517
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1313
Source: MITRE
Published: 2005-07-13
Updated: 2017-10-11
Type: NVD-CWE-Other
Base Score: 2.6
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact Score: 2.9
Exploitability Score: 4.9
Severity: LOW