CVE-2005-1576
https://notcve.org/view.php?id=CVE-2005-1576
The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows uses the Content-Type HTTP header to determine the file type, but saves the original file extension when "Save to Disk" is selected, which allows remote attackers to hide the real file types of downloaded files. • http://secunia.com/advisories/12979 http://secunia.com/secunia_research/2004-11/advisory http://www.osvdb.org/16432 •
CVE-2005-1477 – Mozilla Firefox 1.0.3 - Install Method Arbitrary Code Execution
https://notcve.org/view.php?id=CVE-2005-1477
The install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site. • https://www.exploit-db.com/exploits/986 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://greyhatsecurity.org/firefox.htm http://greyhatsecurity.org/vulntests/ffrc.htm http://marc.info/?l=full-disclosure&m=111553138007647&w=2 http://marc.info/?l=full-disclosure&m=111556301530553&w=2 http://secunia.com/advisories/15292 http://securitytracker.com/id?1013913 http://www.kb.cert.org/vuls/id/648758 http://www.mozilla.org/security/announce/ •
CVE-2005-1476 – Mozilla Firefox 1.0.3 - Install Method Arbitrary Code Execution
https://notcve.org/view.php?id=CVE-2005-1476
Firefox 1.0.3 allows remote attackers to execute arbitrary Javascript in other domains by using an IFRAME and causing the browser to navigate to a previous javascript: URL, which can lead to arbitrary code execution when combined with CVE-2005-1477. • https://www.exploit-db.com/exploits/986 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://greyhatsecurity.org/firefox.htm http://greyhatsecurity.org/vulntests/ffrc.htm http://marc.info/?l=full-disclosure&m=111553138007647&w=2 http://marc.info/?l=full-disclosure&m=111556301530553&w=2 http://secunia.com/advisories/15292 http://securitytracker.com/id?1013913 http://www.kb.cert.org/vuls/id/534710 http://www.mozilla.org/security/announce/ •
CVE-2005-1160
https://notcve.org/view.php?id=CVE-2005-1160
The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/14938 http://secunia.com/advisories/14992 http://secunia.com/advisories/19823 http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml http://www.mozilla.org/security/announce/mfsa2005-41.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.redhat.com/support/errata/RHSA-2005-383.html http://www.redhat.com/support/errata/RHSA-2005-384 •
CVE-2005-1159
https://notcve.org/view.php?id=CVE-2005-1159
The native implementations of InstallTrigger and other functions in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 do not properly verify the types of objects being accessed, which causes the Javascript interpreter to continue execution at the wrong memory address, which may allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code by passing objects of the wrong type. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/14938 http://secunia.com/advisories/14992 http://secunia.com/advisories/19823 http://securitytracker.com/id?1013742 http://securitytracker.com/id?1013743 http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml http://www.mozilla.org/security/announce/mfsa2005-40.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.redhat.com/support/errata& •