7.5
CVSSv2

CVE-2006-1724

Published: 14/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unspecified vulnerability in Firefox and Thunderbird prior to 1.5.0.2, 1.0.x prior to 1.0.8, Mozilla Suite prior to 1.7.13, and SeaMonkey prior to 1.0.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to DHTML.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla seamonkey

mozilla thunderbird

mozilla mozilla suite

mozilla firefox

debian debian linux 3.1

Vendor Advisories

Mozilla Foundation Security Advisory 2006-20 Crashes with evidence of memory corruption (rv:1802) Announced April 13, 2006 Reporter various Impact Critical Products Firefox, SeaMonkey, Thunderbird Fixed in ...

References

NVD-CWE-Otherhttp://www.mozilla.org/security/announce/2006/mfsa2006-20.htmlhttps://bugzilla.mozilla.org/show_bug.cgi?id=282105http://www.redhat.com/support/errata/RHSA-2006-0328.htmlhttp://www.kb.cert.org/vuls/id/350262http://www.securityfocus.com/bid/17516http://securitytracker.com/id?1015919http://securitytracker.com/id?1015921http://securitytracker.com/id?1015920http://secunia.com/advisories/19631http://secunia.com/advisories/19649http://www.us-cert.gov/cas/techalerts/TA06-107A.htmlhttp://www.debian.org/security/2006/dsa-1046http://secunia.com/advisories/19863http://www.debian.org/security/2006/dsa-1051http://secunia.com/advisories/19941http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.htmlhttp://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.htmlhttp://secunia.com/advisories/19714http://www.redhat.com/support/errata/RHSA-2006-0330.htmlftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txthttp://secunia.com/advisories/21033http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1http://secunia.com/advisories/21622http://support.avaya.com/elmodocs2/security/ASA-2006-205.htmhttp://secunia.com/advisories/19696http://secunia.com/advisories/19780http://secunia.com/advisories/22065http://secunia.com/advisories/22066http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1http://www.vupen.com/english/advisories/2006/1356http://www.vupen.com/english/advisories/2008/0083http://www.vupen.com/english/advisories/2006/3749http://www.vupen.com/english/advisories/2006/3748https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1901https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10243http://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/436338/100/0/threadedhttp://www.securityfocus.com/archive/1/434524/100/0/threadedhttps://nvd.nist.govhttps://www.mozilla.org/en-US/security/advisories/mfsa2006-20/https://www.kb.cert.org/vuls/id/350262