First published: Fri Apr 14 2006(Updated: )
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using an eval in an XBL method binding (XBL.method.eval) to create Javascript functions that are compiled with extra privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =1.5-beta2 | |
Mozilla Mozilla Suite | <=1.7.12 | |
Mozilla Firefox | =1.0.2 | |
Mozilla Firefox | =1.5-beta1 | |
Mozilla Firefox | =1.5 | |
Mozilla Mozilla Suite | =1.7.10 | |
Mozilla Firefox | =1.0.4 | |
Mozilla Mozilla Suite | =1.7.8 | |
Mozilla Thunderbird | =1.0 | |
Mozilla Thunderbird | =1.0.1 | |
Mozilla Thunderbird | =1.5-beta2 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla Thunderbird | =1.0.2 | |
Mozilla Mozilla Suite | =1.7.11 | |
Mozilla Firefox | =1.0 | |
Mozilla Thunderbird | =1.5 | |
Mozilla Firefox | =1.0.1 | |
Mozilla Thunderbird | =1.0.4 | |
Mozilla Thunderbird | =1.0.3 | |
Mozilla Firefox | =1.0.3 | |
Mozilla Thunderbird | =1.0.6 | |
Mozilla Thunderbird | =1.0.5-beta | |
Mozilla Mozilla Suite | =1.7.7 | |
Mozilla Firefox | <=1.0.7 | |
Mozilla Mozilla Suite | =1.7.6 | |
Mozilla SeaMonkey | <=1.0 | |
Mozilla Thunderbird | <=1.0.7 | |
Mozilla Thunderbird | =1.0.5 | |
Mozilla Firefox | =1.0.5 | |
Mozilla Firefox | =1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.