CVE-2006-5463

Severity

75%

Complexity

99%

Confidentiality

106%

Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary JavaScript bytecode via unspecified vectors involving modification of a Script object while it is executing.

Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary JavaScript bytecode via unspecified vectors involving modification of a Script object while it is executing.

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

Type

Mozilla

First reported 18 years ago

2006-11-08 22:07:00

Last updated 6 years ago

2018-10-17 21:43:00

Affected Software

Mozilla Firefox 1.5

1.5

Mozilla Firefox 1.5 Beta 1

1.5

Mozilla Firefox 1.5 Beta 2

1.5

Mozilla Firefox 1.5.0.1

1.5.0.1

Mozilla Firefox 1.5.0.2

1.5.0.2

Mozilla Firefox 1.5.0.3

1.5.0.3

Mozilla Firefox 1.5.0.4

1.5.0.4

Mozilla Firefox 1.5.0.5

1.5.0.5

Mozilla Firefox 1.5.0.6

1.5.0.6

Mozilla Firefox 1.5.0.7

1.5.0.7

Mozilla SeaMonkey 1.0

1.0

Mozilla SeaMonkey 1.0.1

1.0.1

Mozilla SeaMonkey 1.0.2

1.0.2

Mozilla SeaMonkey 1.0.3

1.0.3

Mozilla SeaMonkey 1.0.5

1.0.5

Mozilla Thunderbird 1.0

1.0

Mozilla Thunderbird 1.0.2

1.0.2

Mozilla Thunderbird 1.0.5

1.0.5

Mozilla Thunderbird 1.0.6

1.0.6

Mozilla Thunderbird 1.0.7

1.0.7

Mozilla Thunderbird 1.0.8

1.0.8

Mozilla Thunderbird 1.5

1.5

Mozilla Thunderbird 1.5 Beta 2

1.5

Mozilla Thunderbird 1.5.0.2

1.5.0.2

Mozilla Thunderbird 1.5.0.4

1.5.0.4

Mozilla Thunderbird 1.5.0.7

1.5.0.7

References

20061101-01-P

Patch

RHSA-2006:0733

Patch, Vendor Advisory

RHSA-2006:0734

Patch, Vendor Advisory

RHSA-2006:0735

Patch, Vendor Advisory

22066

22722

Patch, Vendor Advisory

22727

Patch, Vendor Advisory

22737

Patch, Vendor Advisory

22763

Patch, Vendor Advisory

22770

Patch, Vendor Advisory

22774

Patch, Vendor Advisory

22815

22817

Patch

22929

Patch, Vendor Advisory

22965

Patch, Vendor Advisory

22980

Patch, Vendor Advisory

23009

Patch, Vendor Advisory

23013

Patch, Vendor Advisory

23197

Patch, Vendor Advisory

23202

Patch, Vendor Advisory

23235

Patch, Vendor Advisory

23263

Patch, Vendor Advisory

23287

Patch, Vendor Advisory

23297

Patch, Vendor Advisory

24711

GLSA-200612-06

Patch, Vendor Advisory

GLSA-200612-07

Patch, Vendor Advisory

GLSA-200612-08

Patch, Vendor Advisory

1017184

Patch

1017185

Patch

1017186

Patch

103011

200185

http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm

Patch, Vendor Advisory

DSA-1224

Patch, Vendor Advisory

DSA-1225

Patch, Vendor Advisory

DSA-1227

Patch, Vendor Advisory

VU#714496

Patch, US Government Resource

MDKSA-2006:205

MDKSA-2006:206

http://www.mozilla.org/security/announce/2006/mfsa2006-67.html

Patch

SUSE-SA:2006:068

Patch, Vendor Advisory

20061109 rPSA-2006-0206-1 firefox thunderbird

20957

USN-381-1

Patch, Vendor Advisory

USN-382-1

Patch, Vendor Advisory

TA06-312A

Patch, US Government Resource

ADV-2006-3748

ADV-2006-4387

ADV-2007-1198

ADV-2007-2663

ADV-2008-0083

SSRT061181

https://bugzilla.mozilla.org/show_bug.cgi?id=355655

mozilla-script-code-execution(30116)

https://issues.rpath.com/browse/RPL-765

oval:org.mitre.oval:def:10357

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.