Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2006-4567
Description:Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2006-4567
1016850
http://securitytracker.com/id?1016850
1016851
http://securitytracker.com/id?1016851
20042
http://www.securityfocus.com/bid/20042
20060915 rPSA-2006-0169-1 firefox thunderbird
http://www.securityfocus.com/archive/1/446140/100/0/threaded
21906
http://secunia.com/advisories/21906
21916
http://secunia.com/advisories/21916
21939
http://secunia.com/advisories/21939
21949
http://secunia.com/advisories/21949
21950
http://secunia.com/advisories/21950
22001
http://secunia.com/advisories/22001
22025
http://secunia.com/advisories/22025
22055
http://secunia.com/advisories/22055
22056
http://secunia.com/advisories/22056
22066
http://secunia.com/advisories/22066
22074
http://secunia.com/advisories/22074
22088
http://secunia.com/advisories/22088
22195
http://secunia.com/advisories/22195
22210
http://secunia.com/advisories/22210
22274
http://secunia.com/advisories/22274
22422
http://secunia.com/advisories/22422
ADV-2006-3617
http://www.vupen.com/english/advisories/2006/3617
ADV-2006-3748
http://www.vupen.com/english/advisories/2006/3748
ADV-2008-0083
http://www.vupen.com/english/advisories/2008/0083
GLSA-200609-19
http://security.gentoo.org/glsa/glsa-200609-19.xml
GLSA-200610-01
http://security.gentoo.org/glsa/glsa-200610-01.xml
HPSBUX02153
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
MDKSA-2006:168
http://www.mandriva.com/security/advisories?name=MDKSA-2006:168
MDKSA-2006:169
http://www.mandriva.com/security/advisories?name=MDKSA-2006:169
RHSA-2006:0675
http://www.redhat.com/support/errata/RHSA-2006-0675.html
RHSA-2006:0677
http://www.redhat.com/support/errata/RHSA-2006-0677.html
SSRT061181
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
SUSE-SA:2006:054
http://www.novell.com/linux/security/advisories/2006_54_mozilla.html
USN-350-1
http://www.ubuntu.com/usn/usn-350-1
USN-351-1
http://www.ubuntu.com/usn/usn-351-1
USN-352-1
http://www.ubuntu.com/usn/usn-352-1
USN-354-1
http://www.ubuntu.com/usn/usn-354-1
http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm
http://www.mozilla.org/security/announce/2006/mfsa2006-58.html
http://www.mozilla.org/security/announce/2006/mfsa2006-58.html
https://issues.rpath.com/browse/RPL-640
https://issues.rpath.com/browse/RPL-640
mozilla-auto-update-gain-access(28950)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28950
oval:org.mitre.oval:def:10488
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10488




© 1998-2025 E-Soft Inc. All rights reserved.