First published: Fri Apr 14 2006(Updated: )
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the "clone parent" internal function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =1.5-beta2 | |
Mozilla Mozilla Suite | <=1.7.12 | |
Mozilla Firefox | =1.0.2 | |
Mozilla Firefox | =1.5-beta1 | |
Mozilla Firefox | =1.5 | |
Mozilla Mozilla Suite | =1.7.10 | |
Mozilla Firefox | =1.0.4 | |
Mozilla Mozilla Suite | =1.7.8 | |
Mozilla Thunderbird | =1.0 | |
Mozilla Thunderbird | =1.0.1 | |
Mozilla Thunderbird | =1.5-beta2 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla Thunderbird | =1.0.2 | |
Mozilla Mozilla Suite | =1.7.11 | |
Mozilla Firefox | =1.0 | |
Mozilla Thunderbird | =1.5 | |
Mozilla Firefox | =1.0.1 | |
Mozilla Thunderbird | =1.0.4 | |
Mozilla Thunderbird | =1.0.3 | |
Mozilla Firefox | =1.0.3 | |
Mozilla Thunderbird | =1.0.6 | |
Mozilla Thunderbird | =1.0.5-beta | |
Mozilla Mozilla Suite | =1.7.7 | |
Mozilla Firefox | <=1.0.7 | |
Mozilla Mozilla Suite | =1.7.6 | |
Mozilla SeaMonkey | <=1.0 | |
Mozilla Thunderbird | <=1.0.7 | |
Mozilla Thunderbird | =1.0.5 | |
Mozilla Firefox | =1.0.5 | |
Mozilla Firefox | =1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.