Vulnerability Name: | CVE-2006-1724 | ||||||||||||||||||||||||||||||||
Assigned: | 2006-04-14 | ||||||||||||||||||||||||||||||||
Published: | 2006-04-14 | ||||||||||||||||||||||||||||||||
Updated: | 2018-10-18 | ||||||||||||||||||||||||||||||||
Summary: | Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to DHTML. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | ALLOWS_USER_ACCESS | ||||||||||||||||||||||||||||||||
References: | Source: SCO Type: Third Party Advisory SCOSA-2006.26 Source: MITRE Type: CNA CVE-2006-1724 Source: SECUNIA Type: Third Party Advisory 19631 Source: SECUNIA Type: Third Party Advisory 19649 Source: SECUNIA Type: Third Party Advisory 19696 Source: SECUNIA Type: Third Party Advisory 19714 Source: SECUNIA Type: Third Party Advisory 19780 Source: SECUNIA Type: Third Party Advisory 19863 Source: SECUNIA Type: Third Party Advisory 19941 Source: SECUNIA Type: Third Party Advisory 21033 Source: SECUNIA Type: Third Party Advisory 21622 Source: SECUNIA Type: Third Party Advisory 22065 Source: SECUNIA Type: Third Party Advisory 22066 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015919 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015920 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015921 Source: SUNALERT Type: Broken Link 102550 Source: SUNALERT Type: Broken Link 228526 Source: CONFIRM Type: Third Party Advisory http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm Source: DEBIAN Type: Third Party Advisory DSA-1046 Source: DEBIAN Type: Third Party Advisory DSA-1051 Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#350262 Source: CONFIRM Type: Vendor Advisory http://www.mozilla.org/security/announce/2006/mfsa2006-20.html Source: FEDORA Type: Third Party Advisory FEDORA-2006-410 Source: FEDORA Type: Third Party Advisory FEDORA-2006-411 Source: REDHAT Type: Third Party Advisory RHSA-2006:0328 Source: REDHAT Type: Third Party Advisory RHSA-2006:0330 Source: HP Type: UNKNOWN SSRT061145 Source: FEDORA Type: UNKNOWN FLSA:189137-2 Source: HP Type: UNKNOWN SSRT061236 Source: HP Type: UNKNOWN SSRT061181 Source: BID Type: Third Party Advisory, VDB Entry 17516 Source: CERT Type: Third Party Advisory, US Government Resource TA06-107A Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-1356 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-3748 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-3749 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2008-0083 Source: MISC Type: Issue Tracking, Vendor Advisory https://bugzilla.mozilla.org/show_bug.cgi?id=282105 Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:10243 Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:1901 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |