CVE-2006-4571

N/A Unknown
Published: September 15, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/21906
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/21915
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21916
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21939
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21940
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21949
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/21950
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22001
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22025
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22036
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22055
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22056
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22066
Source: secalert@redhat.com
http://secunia.com/advisories/22074
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22088
Source: secalert@redhat.com
http://secunia.com/advisories/22195
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22210
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22247
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22274
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22299
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22342
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22391
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22422
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22849
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24711
Source: secalert@redhat.com
http://securitytracker.com/id?1016846
Source: secalert@redhat.com
http://securitytracker.com/id?1016847
Source: secalert@redhat.com
http://securitytracker.com/id?1016848
Source: secalert@redhat.com
http://www.mozilla.org/security/announce/2006/mfsa2006-64.html
Source: secalert@redhat.com
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0676.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0677.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.securityfocus.com/bid/20042
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-350-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-351-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-352-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-354-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-361-1
Source: secalert@redhat.com
https://issues.rpath.com/browse/RPL-640
Source: secalert@redhat.com
http://secunia.com/advisories/21906
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21915
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21916
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21939
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21940
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21949
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21950
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22001
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22025
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22036
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22055
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22056
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22066
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22074
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22088
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22195
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22210
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22247
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22274
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22299
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22342
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22391
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22422
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22849
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24711
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200609-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200610-01.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200610-04.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016846
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016847
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016848
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1192
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1210
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:168
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:169
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2006/mfsa2006-64.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0675.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0676.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0677.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.securityfocus.com/archive/1/446140/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/20042
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-350-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-351-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-352-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-354-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-361-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us.debian.org/security/2006/dsa-1191
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3617
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3748
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/1198
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0083
Source: af854a3a-2127-422b-91ae-364da2661108
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-640
Source: af854a3a-2127-422b-91ae-364da2661108

112 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
11.6%
94th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mozilla