CVE-2005-1937
https://notcve.org/view.php?id=CVE-2005-1937
A regression error in Firefox 1.0.3 and Mozilla 1.7.7 allows remote attackers to inject arbitrary Javascript from one page into the frameset of another site, aka the frame injection spoofing vulnerability, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2004-0718. • http://secunia.com/advisories/15601 http://secunia.com/multiple_browsers_frame_injection_vulnerability_test http://sunsolve.sun.com/search/document.do?assetkey=1-26-101952-1 http://www.debian.org/security/2005/dsa-777 http://www.debian.org/security/2005/dsa-810 http://www.mozilla.org/security/announce/mfsa2005-51.html http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.novell.com/linux/security/advisories/2005_45_mozilla.html http://www.redhat.com/supp •
CVE-2005-1575
https://notcve.org/view.php?id=CVE-2005-1575
The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows allows remote attackers to hide the real file types of downloaded files via the Content-Type HTTP header and a filename containing whitespace, dots, or ASCII byte 160. • http://secunia.com/advisories/12979 http://secunia.com/secunia_research/2004-11/advisory http://www.osvdb.org/16431 •
CVE-2005-1531
https://notcve.org/view.php?id=CVE-2005-1531
Firefox before 1.0.4 and Mozilla Suite before 1.7.8 does not properly implement certain security checks for script injection, which allows remote attackers to execute script via "Wrapped" javascript: URLs, as demonstrated using (1) a javascript: URL in a view-source: URL, (2) a javascript: URL in a jar: URL, or (3) "a nested variant." • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://securitytracker.com/id?1013962 http://securitytracker.com/id?1013963 http://www.mozilla.org/security/announce/mfsa2005-43.html http://www.redhat.com/support/errata/RHSA-2005-434.html http://www.redhat.com/support/errata/RHSA-2005-435.html http://www.securityfocus.com/bid/13641 http://www.securityfocus.com/bid/15495 http://www.vupen.com/english/advisories/2005/0530 https://oval.cisecurity.o •
CVE-2005-1532 – Mozilla Suite And Firefox - DOM Property Overrides Code Execution
https://notcve.org/view.php?id=CVE-2005-1532
Firefox before 1.0.4 and Mozilla Suite before 1.7.8 do not properly limit privileges of Javascript eval and Script objects in the calling context, which allows remote attackers to conduct unauthorized activities via "non-DOM property overrides," a variant of CVE-2005-1160. • https://www.exploit-db.com/exploits/25670 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://secunia.com/advisories/19823 http://securitytracker.com/id?1013964 http://securitytracker.com/id?1013965 http://www.mozilla.org/security/announce/mfsa2005-44.html http://www.novell.com/linux/security/advisories/2006_04_25.html http://www.redhat.com/support/errata/RHSA-2005-434.html http://www.redhat.com/support/errata/RHSA-2005-435.html http:// • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-1576
https://notcve.org/view.php?id=CVE-2005-1576
The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows uses the Content-Type HTTP header to determine the file type, but saves the original file extension when "Save to Disk" is selected, which allows remote attackers to hide the real file types of downloaded files. • http://secunia.com/advisories/12979 http://secunia.com/secunia_research/2004-11/advisory http://www.osvdb.org/16432 •