New Search

Mozilla Security Check of js_ValueToFunctionObject() Can Be Circumvented

oval:org.mitre.oval:def:1968

Unspecified vulnerability in Firefox and Thunderbird 1.5 before 1.5.0.2 and SeaMonkey before 1.0.1 allows remote attackers to bypass the js_ValueToFunctionObject check and execute arbitrary code via unknown vectors involving setTimeout and Firefox' ForEach method.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows 2000
  • Microsoft Windows Server 2003
  • Microsoft Windows XP
Class:
vulnerability
Reference(s):
  • CVE-2006-1726
Product(s):
  • mozilla