
CVE-2006-4565
https://notcve.org/view.php?id=CVE-2006-4565
15 Sep 2006 — Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a "minimal quantifier." Desbordamiento de bufer en Mozilla Firefox anterior a 1.5.0.7, Thunderbird anterior 1.5.0.7, y SeaMonkey anterior 1.0.5 permite a un atacante remoto provocar denegación de servicio (crash) y la posibilidad de ejecutar código de su el... • ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2006-2786
https://notcve.org/view.php?id=CVE-2006-2786
02 Jun 2006 — HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client. • http://rhn.redhat.com/errata/RHSA-2006-0609.html •

CVE-2006-2779
https://notcve.org/view.php?id=CVE-2006-2779
02 Jun 2006 — Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption. • http://rhn.redhat.com/errata/RHSA-2006-0609.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2006-2780
https://notcve.org/view.php?id=CVE-2006-2780
02 Jun 2006 — Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption. • http://rhn.redhat.com/errata/RHSA-2006-0609.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2006-2783
https://notcve.org/view.php?id=CVE-2006-2783
02 Jun 2006 — Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT. • http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2006-2781 – (seamonkey): DOS/arbitrary code execution vuln with vcards
https://notcve.org/view.php?id=CVE-2006-2781
02 Jun 2006 — Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters. • http://rhn.redhat.com/errata/RHSA-2006-0609.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2006-2776
https://notcve.org/view.php?id=CVE-2006-2776
02 Jun 2006 — Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended. • http://rhn.redhat.com/errata/RHSA-2006-0609.html •

CVE-2006-2775
https://notcve.org/view.php?id=CVE-2006-2775
02 Jun 2006 — Mozilla Firefox and Thunderbird before 1.5.0.4 associates XUL attributes with the wrong URL under certain unspecified circumstances, which might allow remote attackers to bypass restrictions by causing a persisted string to be associated with the wrong URL. • http://secunia.com/advisories/20376 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2006-2778
https://notcve.org/view.php?id=CVE-2006-2778
02 Jun 2006 — The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow. • http://rhn.redhat.com/errata/RHSA-2006-0609.html •

CVE-2006-1736
https://notcve.org/view.php?id=CVE-2006-1736
14 Apr 2006 — Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to trick users into downloading and saving an executable file via an image that is overlaid by a transparent image link that points to the executable, which causes the executable to be saved when the user clicks the "Save image as..." option. NOTE: this attack is made easier due to a GUI truncation issue that prevents the user from seeing the malicious extension when there is ... • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt •