Vulnerability Details : CVE-2006-1727
Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to gain chrome privileges via multiple attack vectors related to the use of XBL scripts with "Print Preview".
Exploit prediction scoring system (EPSS) score for CVE-2006-1727
Probability of exploitation activity in the next 30 days: 6.14%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-1727
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
References for CVE-2006-1727
-
http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm
Third Party Advisory
-
http://www.novell.com/linux/security/advisories/2006_04_25.html
404 Page Not Found | SUSEBroken Link
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1649
Third Party Advisory
-
https://usn.ubuntu.com/271-1/
Third Party Advisory
-
http://www.vupen.com/english/advisories/2006/3749
Permissions Required;Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2006-0330.html
Third Party Advisory
-
http://www.vupen.com/english/advisories/2008/0083
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPermissions Required;Third Party Advisory
-
http://www.debian.org/security/2006/dsa-1051
Third Party Advisory
-
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html
Third Party Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml
Third Party Advisory
-
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html
Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2006-0329.html
Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25824
Third Party Advisory;VDB Entry
- http://www.securityfocus.com/archive/1/438730/100/0/threaded
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:078
Third Party Advisory
-
http://securitytracker.com/id?1015929
Third Party Advisory;VDB Entry
-
http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml
Third Party Advisory
-
http://www.vupen.com/english/advisories/2006/1356
Permissions Required;Third Party Advisory
-
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
Broken Link
-
http://www.mozilla.org/security/announce/2006/mfsa2006-25.html
Vendor Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
Broken Link
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
Broken Link
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:076
Third Party Advisory
- http://www.securityfocus.com/archive/1/436296/100/0/threaded
-
http://securitytracker.com/id?1015926
Third Party Advisory;VDB Entry
-
http://www.debian.org/security/2006/dsa-1046
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10364
Third Party Advisory
-
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html
Broken Link
-
http://www.vupen.com/english/advisories/2006/3748
Permissions Required;Third Party Advisory
-
ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc
Broken Link
-
https://usn.ubuntu.com/276-1/
Third Party Advisory
-
http://www.securityfocus.com/bid/17516
Third Party Advisory;VDB Entry
- http://www.securityfocus.com/archive/1/436338/100/0/threaded
- http://www.securityfocus.com/archive/1/446657/100/200/threaded
-
http://securitytracker.com/id?1015928
Third Party Advisory;VDB Entry
-
https://usn.ubuntu.com/275-1/
Third Party Advisory
-
http://www.vupen.com/english/advisories/2006/3391
Permissions Required;Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2006-0328.html
Third Party Advisory
- http://www.securityfocus.com/archive/1/446658/100/200/threaded
-
http://www.debian.org/security/2006/dsa-1044
Third Party Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml
Third Party Advisory
-
http://securitytracker.com/id?1015927
Third Party Advisory;VDB Entry
Products affected by CVE-2006-1727
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*