7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.967 High
EPSS
Percentile
99.6%
The Mozilla Foundation reports of multiple security
vulnerabilities in Firefox and Mozilla:
MFSA 2005-56 Code execution through shared function
objects
MFSA 2005-55 XHTML node spoofing
MFSA 2005-54 Javascript prompt origin spoofing
MFSA 2005-53 Standalone applications can run arbitrary
code through the browser
MFSA 2005-52 Same origin violation: frame calling
top.focus()
MFSA 2005-51 The return of frame-injection
spoofing
MFSA 2005-50 Possibly exploitable crash in
InstallVersion.compareTo()
MFSA 2005-49 Script injection from Firefox sidebar
panel using data:
MFSA 2005-48 Same-origin violation with InstallTrigger
callback
MFSA 2005-47 Code execution via “Set as
Wallpaper”
MFSA 2005-46 XBL scripts ran even when Javascript
disabled
MFSA 2005-45 Content-generated event
vulnerabilities
www.mozilla.org/projects/security/known-vulnerabilities.html
www.mozilla.org/security/announce/mfsa2005-45.html
www.mozilla.org/security/announce/mfsa2005-46.html
www.mozilla.org/security/announce/mfsa2005-47.html
www.mozilla.org/security/announce/mfsa2005-48.html
www.mozilla.org/security/announce/mfsa2005-49.html
www.mozilla.org/security/announce/mfsa2005-50.html
www.mozilla.org/security/announce/mfsa2005-51.html
www.mozilla.org/security/announce/mfsa2005-52.html
www.mozilla.org/security/announce/mfsa2005-53.html
www.mozilla.org/security/announce/mfsa2005-54.html
www.mozilla.org/security/announce/mfsa2005-55.html
www.mozilla.org/security/announce/mfsa2005-56.html