2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2006-3803" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "20060727 rPSA-2006-0137-1 firefox" ,
"refsource" : "BUGTRAQ" ,
2018-10-17 17:05:08 -04:00
"url" : "http://www.securityfocus.com/archive/1/441333/100/0/threaded"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-48.html" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-48.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "https://issues.rpath.com/browse/RPL-536" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "https://issues.rpath.com/browse/RPL-536"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "https://issues.rpath.com/browse/RPL-537" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "https://issues.rpath.com/browse/RPL-537"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "GLSA-200608-02" ,
"refsource" : "GENTOO" ,
2017-10-16 12:31:07 -04:00
"url" : "http://security.gentoo.org/glsa/glsa-200608-02.xml"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "GLSA-200608-04" ,
"refsource" : "GENTOO" ,
2017-10-16 12:31:07 -04:00
"url" : "http://security.gentoo.org/glsa/glsa-200608-04.xml"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "GLSA-200608-03" ,
"refsource" : "GENTOO" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "HPSBUX02153" ,
"refsource" : "HP" ,
2018-10-17 17:05:08 -04:00
"url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "SSRT061181" ,
"refsource" : "HP" ,
2018-10-17 17:05:08 -04:00
"url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "HPSBUX02156" ,
"refsource" : "HP" ,
2018-10-17 17:05:08 -04:00
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "SSRT061236" ,
"refsource" : "HP" ,
2018-10-17 17:05:08 -04:00
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2006:143" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2006:145" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2006:146" ,
"refsource" : "MANDRIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:146"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2006:0608" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0608.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2006:0610" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2006:0611" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2006:0609" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2006:0594" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20060703-01-P" ,
"refsource" : "SGI" ,
2017-10-16 12:31:07 -04:00
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "SUSE-SA:2006:048" ,
"refsource" : "SUSE" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-327-1" ,
"refsource" : "UBUNTU" ,
2018-10-03 17:05:39 -04:00
"url" : "https://usn.ubuntu.com/327-1/"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-329-1" ,
"refsource" : "UBUNTU" ,
2018-10-03 17:05:39 -04:00
"url" : "https://usn.ubuntu.com/329-1/"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-350-1" ,
"refsource" : "UBUNTU" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/usn-350-1"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "USN-354-1" ,
"refsource" : "UBUNTU" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/usn-354-1"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "TA06-208A" ,
"refsource" : "CERT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "VU#265964" ,
"refsource" : "CERT-VN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.kb.cert.org/vuls/id/265964"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "19181" ,
"refsource" : "BID" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/19181"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "oval:org.mitre.oval:def:10635" ,
"refsource" : "OVAL" ,
2017-10-16 12:31:07 -04:00
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10635"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2006-2998" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2006/2998"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2006-3748" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2006/3748"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2006-3749" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2006/3749"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ADV-2008-0083" ,
"refsource" : "VUPEN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2008/0083"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "1016586" ,
"refsource" : "SECTRACK" ,
2017-10-16 12:31:07 -04:00
"url" : "http://securitytracker.com/id?1016586"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "1016587" ,
"refsource" : "SECTRACK" ,
2017-10-16 12:31:07 -04:00
"url" : "http://securitytracker.com/id?1016587"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "1016588" ,
"refsource" : "SECTRACK" ,
2017-10-16 12:31:07 -04:00
"url" : "http://securitytracker.com/id?1016588"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "19873" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/19873"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21216" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21216"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21228" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21228"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21229" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21229"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21246" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21246"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21243" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21243"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21269" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21269"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21270" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21270"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21275" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21275"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21336" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21336"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21358" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21358"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21361" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21361"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21250" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21250"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21262" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21262"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21343" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21343"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21529" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21529"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21532" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21532"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21607" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21607"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21631" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/21631"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "22055" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/22055"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "22210" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/22210"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "22065" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/22065"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "22066" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/22066"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "mozilla-javascript-garbage-race-condition(27984)" ,
"refsource" : "XF" ,
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27984"
}
]
}
}