![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1160
https://notcve.org/view.php?id=CVE-2005-1160
18 Apr 2005 — The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0399
https://notcve.org/view.php?id=CVE-2005-0399
24 Mar 2005 — Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0401
https://notcve.org/view.php?id=CVE-2005-0401
24 Mar 2005 — FireFox 1.0.1 and Mozilla before 1.7.6 do not sufficiently address all attack vectors for loading chrome files and hijacking drag and drop events, which allows remote attackers to execute arbitrary XUL code by tricking a user into dragging a scrollbar, a variant of CVE-2005-0527, aka "Firescrolling 2." • http://marc.info/?l=bugtraq&m=111168413007891&w=2 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0584
https://notcve.org/view.php?id=CVE-2005-0584
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6, when displaying the HTTP Authentication dialog, do not change the focus to the tab that generated the prompt, which could facilitate spoofing and phishing attacks. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0590
https://notcve.org/view.php?id=CVE-2005-0590
28 Feb 2005 — The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname. • http://secunia.com/advisories/19823 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0588
https://notcve.org/view.php?id=CVE-2005-0588
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 does not restrict xsl:include and xsl:import tags in XSLT stylesheets to the current domain, which allows remote attackers to determine the existence of files on the local system. • http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0585
https://notcve.org/view.php?id=CVE-2005-0585
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 truncates long sub-domains or paths for display, which may allow remote malicious web sites to spoof legitimate sites and facilitate phishing attacks. • http://secunia.com/advisories/13599 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0586
https://notcve.org/view.php?id=CVE-2005-0586
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to spoof the extensions of files to download via the Content-Disposition header, which could be used to trick users into downloading dangerous content. • http://secunia.com/advisories/13258 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0592
https://notcve.org/view.php?id=CVE-2005-0592
28 Feb 2005 — Heap-based buffer overflow in the UTF8ToNewUnicode function for Firefox before 1.0.1 and Mozilla before 1.7.6 might allow remote attackers to cause a denial of service (crash) or execute arbitrary code via invalid sequences in a UTF8 encoded string that result in a zero length value. • http://secunia.com/advisories/19823 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0587
https://notcve.org/view.php?id=CVE-2005-0587
28 Feb 2005 — Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to overwrite arbitrary files by tricking the user into downloading a .LNK (link) file twice, which overwrites the file that was referenced in the first .LNK file. • http://secunia.com/advisories/19823 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •