CVE-2006-2775

N/A Unknown
Published: June 02, 2006 Modified: April 16, 2026
View on NVD

Description

Mozilla Firefox and Thunderbird before 1.5.0.4 associates XUL attributes with the wrong URL under certain unspecified circumstances, which might allow remote attackers to bypass restrictions by causing a persisted string to be associated with the wrong URL.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/20376
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/20382
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/20561
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/20709
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21176
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21178
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21183
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21188
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21210
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21324
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21532
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21607
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22065
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22066
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/243153
Source: cve@mitre.org
Patch US Government Resource
http://www.mozilla.org/security/announce/2006/mfsa2006-35.html
Source: cve@mitre.org
Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
Source: cve@mitre.org
Patch US Government Resource
http://www.vupen.com/english/advisories/2006/2106
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3748
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3749
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/0083
Source: cve@mitre.org
Vendor Advisory
https://usn.ubuntu.com/296-1/
Source: cve@mitre.org
https://usn.ubuntu.com/296-2/
Source: cve@mitre.org
https://usn.ubuntu.com/297-1/
Source: cve@mitre.org
https://usn.ubuntu.com/297-3/
Source: cve@mitre.org
https://usn.ubuntu.com/323-1/
Source: cve@mitre.org
http://secunia.com/advisories/20376
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20382
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20561
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20709
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21176
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21178
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21183
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21188
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21210
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21324
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21532
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21607
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22065
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22066
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1016202
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016214
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1118
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1120
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1134
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/243153
Source: af854a3a-2127-422b-91ae-364da2661108
Patch US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2006/mfsa2006-35.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.securityfocus.com/archive/1/435795/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/446657/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/446658/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18228
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch US Government Resource
http://www.vupen.com/english/advisories/2006/2106
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3748
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3749
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/0083
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/26846
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/296-1/
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/296-2/
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/297-1/
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/297-3/
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/323-1/
Source: af854a3a-2127-422b-91ae-364da2661108

84 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
7.9%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla