Max CVSS | 7.5 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2005-0989 | 5.0 |
The find_replen function in jsstr.c in the Javascript engine for Mozilla Suite 1.7.6, Firefox 1.0.1 and 1.0.2, and Netscape 7.2 allows remote attackers to read portions of heap memory in a Javascript string via the lambda replace method.
|
03-05-2018 - 01:29 | 02-05-2005 - 04:00 | |
CVE-2005-1159 | 7.5 |
The native implementations of InstallTrigger and other functions in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 do not properly verify the types of objects being accessed, which causes the Javascript interpreter to continue execution at the w
|
11-10-2017 - 01:30 | 02-05-2005 - 04:00 | |
CVE-2005-1154 | 7.5 |
Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary script in other domains via a setter function for a variable in the target domain, which is executed when the user visits that domain, aka "Cross-site sc
|
11-10-2017 - 01:30 | 02-05-2005 - 04:00 | |
CVE-2005-1160 | 5.1 |
The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval func
|
11-10-2017 - 01:30 | 02-05-2005 - 04:00 | |
CVE-2005-1153 | 7.5 |
Firefox before 1.0.3 and Mozilla Suite before 1.7.7, when blocking a popup, allows remote attackers to execute arbitrary code via a javascript: URL that is executed when the user selects the "Show javascript" option.
|
11-10-2017 - 01:30 | 02-05-2005 - 04:00 | |
CVE-2005-1156 | 7.5 |
Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to execute arbitrary script and code via a new search plugin using sidebar.addSearchEngine, aka "Firesearching 1."
|
11-10-2017 - 01:30 | 02-05-2005 - 04:00 | |
CVE-2005-1155 | 7.5 |
The favicon functionality in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary code via a <LINK rel="icon"> tag with a javascript: URL in the href attribute, aka "Firelinking."
|
11-10-2017 - 01:30 | 02-05-2005 - 04:00 |