Multiple unspecified vulnerabilities in the JavaScript engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, SeaMonkey before 1.0.7, and Mozilla 1.7 and probably earlier on Solaris, allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown impact and attack vectors.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc - | |
References | () http://fedoranews.org/cms/node/2297 - | |
References | () http://fedoranews.org/cms/node/2338 - | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - | |
References | () http://rhn.redhat.com/errata/RHSA-2006-0758.html - Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2006-0759.html - Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2006-0760.html - Vendor Advisory | |
References | () http://secunia.com/advisories/23282 - Vendor Advisory | |
References | () http://secunia.com/advisories/23420 - Vendor Advisory | |
References | () http://secunia.com/advisories/23422 - Vendor Advisory | |
References | () http://secunia.com/advisories/23433 - Vendor Advisory | |
References | () http://secunia.com/advisories/23439 - Vendor Advisory | |
References | () http://secunia.com/advisories/23440 - Vendor Advisory | |
References | () http://secunia.com/advisories/23468 - Vendor Advisory | |
References | () http://secunia.com/advisories/23514 - Vendor Advisory | |
References | () http://secunia.com/advisories/23545 - Vendor Advisory | |
References | () http://secunia.com/advisories/23589 - Vendor Advisory | |
References | () http://secunia.com/advisories/23591 - Vendor Advisory | |
References | () http://secunia.com/advisories/23601 - Vendor Advisory | |
References | () http://secunia.com/advisories/23614 - Vendor Advisory | |
References | () http://secunia.com/advisories/23618 - Vendor Advisory | |
References | () http://secunia.com/advisories/23672 - Vendor Advisory | |
References | () http://secunia.com/advisories/23692 - Vendor Advisory | |
References | () http://secunia.com/advisories/23988 - Vendor Advisory | |
References | () http://secunia.com/advisories/24078 - Vendor Advisory | |
References | () http://secunia.com/advisories/24390 - Vendor Advisory | |
References | () http://secunia.com/advisories/25556 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200701-02.xml - | |
References | () http://securitytracker.com/id?1017398 - | |
References | () http://securitytracker.com/id?1017405 - | |
References | () http://securitytracker.com/id?1017406 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102955-1 - | |
References | () http://www.debian.org/security/2007/dsa-1253 - | |
References | () http://www.debian.org/security/2007/dsa-1258 - | |
References | () http://www.debian.org/security/2007/dsa-1265 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml - | |
References | () http://www.kb.cert.org/vuls/id/427972 - US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/447772 - US Government Resource | |
References | () http://www.mozilla.org/security/announce/2006/mfsa2006-68.html - | |
References | () http://www.novell.com/linux/security/advisories/2006_80_mozilla.html - | |
References | () http://www.novell.com/linux/security/advisories/2007_06_mozilla.html - | |
References | () http://www.securityfocus.com/archive/1/455145/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/455728/100/200/threaded - | |
References | () http://www.securityfocus.com/bid/21668 - | |
References | () http://www.ubuntu.com/usn/usn-398-1 - | |
References | () http://www.ubuntu.com/usn/usn-398-2 - | |
References | () http://www.ubuntu.com/usn/usn-400-1 - | |
References | () http://www.us-cert.gov/cas/techalerts/TA06-354A.html - US Government Resource | |
References | () http://www.vupen.com/english/advisories/2006/5068 - | |
References | () http://www.vupen.com/english/advisories/2007/2106 - | |
References | () http://www.vupen.com/english/advisories/2008/0083 - | |
References | () https://issues.rpath.com/browse/RPL-883 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10661 - |
Information
Published : 2006-12-20 01:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6498
Mitre link : CVE-2006-6498
CVE.ORG link : CVE-2006-6498
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- mozilla
- seamonkey
CWE