Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2006-3803
Description:Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2006-3803
1016586
http://securitytracker.com/id?1016586
1016587
http://securitytracker.com/id?1016587
1016588
http://securitytracker.com/id?1016588
19181
http://www.securityfocus.com/bid/19181
19873
http://secunia.com/advisories/19873
20060703-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
20060727 rPSA-2006-0137-1 firefox
http://www.securityfocus.com/archive/1/441333/100/0/threaded
21216
http://secunia.com/advisories/21216
21228
http://secunia.com/advisories/21228
21229
http://secunia.com/advisories/21229
21243
http://secunia.com/advisories/21243
21246
http://secunia.com/advisories/21246
21250
http://secunia.com/advisories/21250
21262
http://secunia.com/advisories/21262
21269
http://secunia.com/advisories/21269
21270
http://secunia.com/advisories/21270
21275
http://secunia.com/advisories/21275
21336
http://secunia.com/advisories/21336
21343
http://secunia.com/advisories/21343
21358
http://secunia.com/advisories/21358
21361
http://secunia.com/advisories/21361
21529
http://secunia.com/advisories/21529
21532
http://secunia.com/advisories/21532
21607
http://secunia.com/advisories/21607
21631
http://secunia.com/advisories/21631
22055
http://secunia.com/advisories/22055
22065
http://secunia.com/advisories/22065
22066
http://secunia.com/advisories/22066
22210
http://secunia.com/advisories/22210
ADV-2006-2998
http://www.vupen.com/english/advisories/2006/2998
ADV-2006-3748
http://www.vupen.com/english/advisories/2006/3748
ADV-2006-3749
http://www.vupen.com/english/advisories/2006/3749
ADV-2008-0083
http://www.vupen.com/english/advisories/2008/0083
GLSA-200608-02
http://security.gentoo.org/glsa/glsa-200608-02.xml
GLSA-200608-03
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml
GLSA-200608-04
http://security.gentoo.org/glsa/glsa-200608-04.xml
HPSBUX02153
http://www.securityfocus.com/archive/1/446658/100/200/threaded
HPSBUX02156
http://www.securityfocus.com/archive/1/446657/100/200/threaded
MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
MDKSA-2006:146
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
RHSA-2006:0594
http://www.redhat.com/support/errata/RHSA-2006-0594.html
RHSA-2006:0608
http://www.redhat.com/support/errata/RHSA-2006-0608.html
RHSA-2006:0609
http://rhn.redhat.com/errata/RHSA-2006-0609.html
RHSA-2006:0610
http://www.redhat.com/support/errata/RHSA-2006-0610.html
RHSA-2006:0611
http://www.redhat.com/support/errata/RHSA-2006-0611.html
SSRT061181
http://www.securityfocus.com/archive/1/446658/100/200/threaded
SSRT061236
http://www.securityfocus.com/archive/1/446657/100/200/threaded
SUSE-SA:2006:048
http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html
TA06-208A
http://www.us-cert.gov/cas/techalerts/TA06-208A.html
USN-327-1
https://usn.ubuntu.com/327-1/
USN-329-1
https://usn.ubuntu.com/329-1/
USN-350-1
http://www.ubuntu.com/usn/usn-350-1
USN-354-1
http://www.ubuntu.com/usn/usn-354-1
VU#265964
http://www.kb.cert.org/vuls/id/265964
http://www.mozilla.org/security/announce/2006/mfsa2006-48.html
http://www.mozilla.org/security/announce/2006/mfsa2006-48.html
https://issues.rpath.com/browse/RPL-536
https://issues.rpath.com/browse/RPL-536
https://issues.rpath.com/browse/RPL-537
https://issues.rpath.com/browse/RPL-537
mozilla-javascript-garbage-race-condition(27984)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27984
oval:org.mitre.oval:def:10635
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10635




© 1998-2025 E-Soft Inc. All rights reserved.