Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-6505

Опубликовано: 20 дек. 2006
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 6.8

Описание

Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.

РелизСтатусПримечание
dapper

released

1.5.0.13-0ubuntu0.6.06
devel

DNE

edgy

released

1.5.0.13-0ubuntu0.6.10
feisty

released

1.5.0.13-0ubuntu0.7.04
upstream

needs-triage

Показывать по

EPSS

Процентиль: 96%
0.26928
Средний

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 18 лет назад

Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.

nvd
больше 18 лет назад

Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.

debian
больше 18 лет назад

Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5 ...

github
больше 3 лет назад

Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.

EPSS

Процентиль: 96%
0.26928
Средний

6.8 Medium

CVSS2