
CVE-2005-2968 – Mozilla Browser/Firefox - Arbitrary Command Execution
https://notcve.org/view.php?id=CVE-2005-2968
20 Sep 2005 — Firefox 1.0.6 and Mozilla 1.7.10 allows attackers to execute arbitrary commands via shell metacharacters in a URL that is provided to the browser on the command line, which is sent unfiltered to bash. • https://www.exploit-db.com/exploits/26288 •

CVE-2005-2260
https://notcve.org/view.php?id=CVE-2005-2260
13 Jul 2005 — The browser user interface in Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 does not properly distinguish between user-generated events and untrusted synthetic events, which makes it easier for remote attackers to perform dangerous actions that normally could only be performed manually by the user. • http://bugzilla.mozilla.org/show_bug.cgi?id=289940 •

CVE-2005-2261
https://notcve.org/view.php?id=CVE-2005-2261
13 Jul 2005 — Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection. • http://secunia.com/advisories/16043 •

CVE-2005-2263
https://notcve.org/view.php?id=CVE-2005-2263
13 Jul 2005 — The InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation. • http://secunia.com/advisories/16043 •

CVE-2005-2265 – Mozilla Suite/Firefox - InstallVersion->compareTo() Code Execution
https://notcve.org/view.php?id=CVE-2005-2265
13 Jul 2005 — Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string. • https://www.exploit-db.com/exploits/16306 •

CVE-2005-2266
https://notcve.org/view.php?id=CVE-2005-2266
13 Jul 2005 — Firefox before 1.0.5 and Mozilla before 1.7.9 allows a child frame to call top.focus and other methods in a parent frame, even when the parent is in a different domain, which violates the same origin policy and allows remote attackers to steal sensitive information such as cookies and passwords from web sites whose child frames do not verify that they are in the same domain as their parents. • http://secunia.com/advisories/15549 •

CVE-2005-2268
https://notcve.org/view.php?id=CVE-2005-2268
13 Jul 2005 — Firefox before 1.0.5 and Mozilla before 1.7.9 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability." • http://secunia.com/advisories/15489 •

CVE-2005-2269
https://notcve.org/view.php?id=CVE-2005-2269
13 Jul 2005 — Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties ("XHTML node spoofing"). • http://secunia.com/advisories/16043 •

CVE-2005-2270
https://notcve.org/view.php?id=CVE-2005-2270
13 Jul 2005 — Firefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object. • http://secunia.com/advisories/16043 •

CVE-2005-2114
https://notcve.org/view.php?id=CVE-2005-2114
01 Jul 2005 — Mozilla 1.7.8, Firefox 1.0.4, Camino 0.8.4, Netscape 8.0.2, and K-Meleon 0.9, and possibly other products that use the Gecko engine, allow remote attackers to cause a denial of service (application crash) via JavaScript that repeatedly calls an empty function. • http://marc.info/?l=bugtraq&m=112008299210033&w=2 •