
CVE-2005-0590
https://notcve.org/view.php?id=CVE-2005-0590
28 Feb 2005 — The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname. • http://secunia.com/advisories/19823 •

CVE-2005-0588
https://notcve.org/view.php?id=CVE-2005-0588
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 does not restrict xsl:include and xsl:import tags in XSLT stylesheets to the current domain, which allows remote attackers to determine the existence of files on the local system. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •

CVE-2005-0585
https://notcve.org/view.php?id=CVE-2005-0585
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 truncates long sub-domains or paths for display, which may allow remote malicious web sites to spoof legitimate sites and facilitate phishing attacks. • http://secunia.com/advisories/13599 •

CVE-2005-0255
https://notcve.org/view.php?id=CVE-2005-0255
28 Feb 2005 — String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption. • http://secunia.com/advisories/19823 •

CVE-2005-0586
https://notcve.org/view.php?id=CVE-2005-0586
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to spoof the extensions of files to download via the Content-Disposition header, which could be used to trick users into downloading dangerous content. • http://secunia.com/advisories/13258 •

CVE-2005-0592
https://notcve.org/view.php?id=CVE-2005-0592
28 Feb 2005 — Heap-based buffer overflow in the UTF8ToNewUnicode function for Firefox before 1.0.1 and Mozilla before 1.7.6 might allow remote attackers to cause a denial of service (crash) or execute arbitrary code via invalid sequences in a UTF8 encoded string that result in a zero length value. • http://secunia.com/advisories/19823 •

CVE-2005-0591
https://notcve.org/view.php?id=CVE-2005-0591
28 Feb 2005 — Firefox before 1.0.1 allows remote attackers to spoof the (1) security and (2) download modal dialog boxes, which could be used to trick users into executing script or downloading and executing a file, aka "Firespoofing." • http://marc.info/?l=bugtraq&m=110547286002188&w=2 •

CVE-2005-0587
https://notcve.org/view.php?id=CVE-2005-0587
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to overwrite arbitrary files by tricking the user into downloading a .LNK (link) file twice, which overwrites the file that was referenced in the first .LNK file. • http://secunia.com/advisories/19823 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2005-0593
https://notcve.org/view.php?id=CVE-2005-0593
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •

CVE-2005-0589
https://notcve.org/view.php?id=CVE-2005-0589
28 Feb 2005 — The Form Fill feature in Firefox before 1.0.1 allows remote attackers to steal potentially sensitive information via an input control that monitors the values that are generated by the autocomplete capability. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •