CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
96.5%
Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via “an invalid and non-sensical ordering of table-related tags” that results in a negative array index.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox | 1.0 | cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:* |
mozilla | firefox | 1.0.1 | cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:* |
mozilla | firefox | 1.0.2 | cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:* |
mozilla | firefox | 1.0.3 | cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* |
mozilla | firefox | 1.0.4 | cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:* |
mozilla | firefox | 1.0.5 | cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* |
mozilla | firefox | 1.0.6 | cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:* |
mozilla | firefox | 1.0.7 | cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:* |
mozilla | firefox | 1.5 | cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:* |
mozilla | firefox | 1.5 | cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc
secunia.com/advisories/19759
secunia.com/advisories/19794
secunia.com/advisories/19811
secunia.com/advisories/19821
secunia.com/advisories/19823
secunia.com/advisories/19852
secunia.com/advisories/19862
secunia.com/advisories/19863
secunia.com/advisories/19902
secunia.com/advisories/19941
secunia.com/advisories/19950
secunia.com/advisories/20051
secunia.com/advisories/21033
secunia.com/advisories/21622
secunia.com/advisories/22065
secunia.com/advisories/22066
sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
support.avaya.com/elmodocs2/security/ASA-2006-205.htm
www.debian.org/security/2006/dsa-1044
www.debian.org/security/2006/dsa-1046
www.debian.org/security/2006/dsa-1051
www.gentoo.org/security/en/glsa/glsa-200604-12.xml
www.gentoo.org/security/en/glsa/glsa-200604-18.xml
www.gentoo.org/security/en/glsa/glsa-200605-09.xml
www.mandriva.com/security/advisories?name=MDKSA-2006:075
www.mandriva.com/security/advisories?name=MDKSA-2006:076
www.mandriva.com/security/advisories?name=MDKSA-2006:078
www.mozilla.org/security/announce/2006/mfsa2006-27.html
www.novell.com/linux/security/advisories/2006_04_25.html
www.redhat.com/support/errata/RHSA-2006-0329.html
www.redhat.com/support/errata/RHSA-2006-0330.html
www.securityfocus.com/archive/1/432103/100/0/threaded
www.securityfocus.com/archive/1/436296/100/0/threaded
www.securityfocus.com/archive/1/436338/100/0/threaded
www.securityfocus.com/archive/1/438730/100/0/threaded
www.securityfocus.com/archive/1/446657/100/200/threaded
www.securityfocus.com/archive/1/446658/100/200/threaded
www.securityfocus.com/bid/17516
www.vupen.com/english/advisories/2006/1356
www.vupen.com/english/advisories/2006/3391
www.vupen.com/english/advisories/2006/3748
www.vupen.com/english/advisories/2006/3749
www.vupen.com/english/advisories/2008/0083
www.zerodayinitiative.com/advisories/ZDI-06-011/
exchange.xforce.ibmcloud.com/vulnerabilities/25985
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11164
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1189
usn.ubuntu.com/275-1/
usn.ubuntu.com/276-1/