Vulnerability Details : CVE-2006-1724
Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to DHTML.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2006-1724
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1724
9.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1724
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-1724
-
http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm
ASA-2006-205 (SUN 102502, 102513, 102514, 102519, 102550, 102556, 102557, 102582, 102588, 102589, 102593)Third Party Advisory
-
http://www.securityfocus.com/archive/1/434524/100/0/threaded
-
https://bugzilla.mozilla.org/show_bug.cgi?id=282105
282105 - [FIX]BoxObject's InvalidatePresentationStuff needs ability to tell document to remove it from its boxobject tableIssue Tracking;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/350262
VU#350262 - Mozilla DHTML memory corruption vulnerabilitiesThird Party Advisory;US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10243
404 Not FoundThird Party Advisory
-
http://www.vupen.com/english/advisories/2006/3749
Site en constructionPermissions Required;Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2006-0330.html
SupportThird Party Advisory
-
http://www.vupen.com/english/advisories/2008/0083
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPermissions Required;Third Party Advisory
-
http://www.debian.org/security/2006/dsa-1051
[SECURITY] [DSA 1051-1] New Mozilla Thunderbird packages fix several vulnerabilitiesThird Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1901
404 Not FoundThird Party Advisory
-
http://securitytracker.com/id?1015920
Access DeniedThird Party Advisory;VDB Entry
-
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html
[SECURITY] Fedora Core 5 Update: firefox-1.5.0.2-1.1.fc5Third Party Advisory
-
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html
[SECURITY] Fedora Core 4 Update: firefox-1.0.8-1.1.fc4Third Party Advisory
-
http://www.vupen.com/english/advisories/2006/1356
Site en constructionPermissions Required;Third Party Advisory
-
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
Third Party Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
Broken Link
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
Broken Link
-
http://securitytracker.com/id?1015921
Access DeniedThird Party Advisory;VDB Entry
-
http://www.us-cert.gov/cas/techalerts/TA06-107A.html
Page Not Found | CISAThird Party Advisory;US Government Resource
-
http://www.debian.org/security/2006/dsa-1046
[SECURITY] [DSA 1046-1] New Mozilla packages fix several vulnerabilitiesThird Party Advisory
-
http://www.mozilla.org/security/announce/2006/mfsa2006-20.html
Crashes with evidence of memory corruption (rv:1.8.0.2) — MozillaVendor Advisory
-
http://www.vupen.com/english/advisories/2006/3748
Site en constructionPermissions Required;Third Party Advisory
-
http://securitytracker.com/id?1015919
Access DeniedThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/17516
Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/archive/1/436338/100/0/threaded
-
http://www.securityfocus.com/archive/1/446657/100/200/threaded
-
http://www.redhat.com/support/errata/RHSA-2006-0328.html
SupportThird Party Advisory
-
http://www.securityfocus.com/archive/1/446658/100/200/threaded
Jump to