CVE-2006-3812
Published Jul 29, 2006
Last updated 6 years ago
Overview
- Description
- Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABB88E86-6E83-4A59-9266-8B98AA91774D" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66BE50FE-EA21-4633-A181-CD35196DF06E" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D6BF5B1-86D1-47FE-9D9C-735718F94874" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84D15CE0-69DF-4EFD-801E-96A4D6AABEDB" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2F38886-C25A-4C6B-93E7-36461405BA99" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09E18FC0-0C8C-4FA1-85B9-B868D00F002F" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D62F740C-706B-4290-AD92-3ECBC3D30768" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55344F76-1C42-4DD8-A28B-1C33626C6FD2" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB01A97F-ACE1-4A99-8939-6DF8FE5B5E8E" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6521C877-63C9-4B6E-9FC9-1263FFBB7950" }, { "criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D949DF0A-CBC2-40E1-AE6C-60E6F58D2481" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FB87608-0DF8-4729-95C5-CFA386AB3AC2" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A406214-29E5-4E13-B2E1-1CF72F1E60BC" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6C169DA-26BC-42EE-817B-2F0685069495" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C99BAF7-B48E-4402-B2BF-EB07235E402E" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3F0C73F-291F-4A92-87B8-2269B5C1516D" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84BC6D68-4ED4-43CF-A2EB-47BD15D11AE5" }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D291234-D64A-4E8A-A7CD-08BB980E1CD6" } ], "operator": "OR" } ] } ]