CVE-2006-3810

N/A Unknown
Published: July 27, 2006 Modified: April 16, 2026
View on NVD

Description

Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/19873
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/21216
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/21228
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/21229
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/21243
Source: secalert@redhat.com
http://secunia.com/advisories/21246
Source: secalert@redhat.com
http://secunia.com/advisories/21250
Source: secalert@redhat.com
http://secunia.com/advisories/21262
Source: secalert@redhat.com
http://secunia.com/advisories/21269
Source: secalert@redhat.com
http://secunia.com/advisories/21270
Source: secalert@redhat.com
http://secunia.com/advisories/21275
Source: secalert@redhat.com
http://secunia.com/advisories/21336
Source: secalert@redhat.com
http://secunia.com/advisories/21343
Source: secalert@redhat.com
http://secunia.com/advisories/21358
Source: secalert@redhat.com
http://secunia.com/advisories/21361
Source: secalert@redhat.com
http://secunia.com/advisories/21529
Source: secalert@redhat.com
http://secunia.com/advisories/21532
Source: secalert@redhat.com
http://secunia.com/advisories/21607
Source: secalert@redhat.com
http://secunia.com/advisories/21631
Source: secalert@redhat.com
http://secunia.com/advisories/21634
Source: secalert@redhat.com
http://secunia.com/advisories/21654
Source: secalert@redhat.com
http://secunia.com/advisories/22055
Source: secalert@redhat.com
http://secunia.com/advisories/22065
Source: secalert@redhat.com
http://secunia.com/advisories/22066
Source: secalert@redhat.com
http://secunia.com/advisories/22210
Source: secalert@redhat.com
http://securitytracker.com/id?1016586
Source: secalert@redhat.com
http://securitytracker.com/id?1016587
Source: secalert@redhat.com
http://securitytracker.com/id?1016588
Source: secalert@redhat.com
http://www.kb.cert.org/vuls/id/911004
Source: secalert@redhat.com
US Government Resource
http://www.mozilla.org/security/announce/2006/mfsa2006-54.html
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/19181
Source: secalert@redhat.com
Patch
http://www.ubuntu.com/usn/usn-350-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-354-1
Source: secalert@redhat.com
https://issues.rpath.com/browse/RPL-536
Source: secalert@redhat.com
https://issues.rpath.com/browse/RPL-537
Source: secalert@redhat.com
https://usn.ubuntu.com/327-1/
Source: secalert@redhat.com
https://usn.ubuntu.com/329-1/
Source: secalert@redhat.com
http://rhn.redhat.com/errata/RHSA-2006-0609.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19873
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21216
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21228
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21229
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21243
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21246
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21250
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21262
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21269
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21270
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21275
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21336
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21343
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21358
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21361
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21529
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21532
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21607
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21631
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21634
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21654
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22055
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22065
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22066
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22210
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200608-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200608-04.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016586
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016587
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016588
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1159
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1160
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/911004
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2006/mfsa2006-54.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0594.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0608.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0610.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0611.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/441333/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/446657/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/446658/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19181
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.ubuntu.com/usn/usn-350-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-354-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2998
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3748
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3749
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0083
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27991
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-536
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-537
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/327-1/
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/329-1/
Source: af854a3a-2127-422b-91ae-364da2661108

122 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
13.6%
94th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mozilla