rhsa-2006:0328
Vulnerability from csaf_redhat
Published
2006-04-14 15:54
Modified
2025-01-12 19:22
Summary
Red Hat Security Advisory: firefox security update

Notes

Topic
Updated firefox packages that fix several security bugs are now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 24 Apr 2006] The erratum text has been updated to include CVE-2006-0748, an issue fixed by these erratum packages but which was not public at the time of release. No changes have been made to the packages.
Details
Mozilla Firefox is an open source Web browser. Several bugs were found in the way Firefox processes malformed javascript. A malicious web page could modify the content of a different open web page, possibly stealing sensitive information or conducting a cross-site scripting attack. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741) Several bugs were found in the way Firefox processes certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of "chrome", allowing the page to steal sensitive information or install browser malware. (CVE-2006-1727, CVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742) Several bugs were found in the way Firefox processes malformed web pages. A carefully crafted malicious web page could cause the execution of arbitrary code as the user running Firefox. (CVE-2006-0748, CVE-2006-0749, CVE-2006-1724, CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1790) A bug was found in the way Firefox displays the secure site icon. If a browser is configured to display the non-default secure site modal warning dialog, it may be possible to trick a user into believing they are viewing a secure site. (CVE-2006-1740) A bug was found in the way Firefox allows javascript mutation events on "input" form elements. A malicious web page could be created in such a way that when a user submits a form, an arbitrary file could be uploaded to the attacker. (CVE-2006-1729) Users of Firefox are advised to upgrade to these updated packages containing Firefox version 1.0.8 which corrects these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated firefox packages that fix several security bugs are now available.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.\n\n[Updated 24 Apr 2006]\nThe erratum text has been updated to include CVE-2006-0748, an issue fixed\nby these erratum packages but which was not public at the time of release.\nNo changes have been made to the packages.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Mozilla Firefox is an open source Web browser.\n\nSeveral bugs were found in the way Firefox processes malformed javascript.\nA malicious web page could modify the content of a different open web page,\npossibly stealing sensitive information or conducting a cross-site\nscripting attack. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741)\n\nSeveral bugs were found in the way Firefox processes certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-1727,\nCVE-2006-1728, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742)\n\nSeveral bugs were found in the way Firefox processes malformed web pages.\nA carefully crafted malicious web page could cause the execution of\narbitrary code as the user running Firefox. (CVE-2006-0748, CVE-2006-0749,\nCVE-2006-1724, CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739,\nCVE-2006-1790) \n\nA bug was found in the way Firefox displays the secure site icon. If a\nbrowser is configured to display the non-default secure site modal warning\ndialog, it may be possible to trick a user into believing they are viewing\na secure site. (CVE-2006-1740)\n\nA bug was found in the way Firefox allows javascript mutation events on\n\"input\" form elements. A malicious web page could be created in such a way\nthat when a user submits a form, an arbitrary file could be uploaded to the\nattacker. (CVE-2006-1729)\n\nUsers of Firefox are advised to upgrade to these updated packages\ncontaining Firefox version 1.0.8 which corrects these issues.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2006:0328",
        "url": "https://access.redhat.com/errata/RHSA-2006:0328"
      },
      {
        "category": "external",
        "summary": "http://www.mozilla.com/firefox/releases/1.0.8.html",
        "url": "http://www.mozilla.com/firefox/releases/1.0.8.html"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#critical",
        "url": "http://www.redhat.com/security/updates/classification/#critical"
      },
      {
        "category": "external",
        "summary": "183537",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=183537"
      },
      {
        "category": "external",
        "summary": "188814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188814"
      },
      {
        "category": "external",
        "summary": "188816",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188816"
      },
      {
        "category": "external",
        "summary": "188818",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188818"
      },
      {
        "category": "external",
        "summary": "188820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188820"
      },
      {
        "category": "external",
        "summary": "188822",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188822"
      },
      {
        "category": "external",
        "summary": "188824",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188824"
      },
      {
        "category": "external",
        "summary": "188826",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188826"
      },
      {
        "category": "external",
        "summary": "188828",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188828"
      },
      {
        "category": "external",
        "summary": "188830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188830"
      },
      {
        "category": "external",
        "summary": "188832",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188832"
      },
      {
        "category": "external",
        "summary": "188834",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188834"
      },
      {
        "category": "external",
        "summary": "188836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188836"
      },
      {
        "category": "external",
        "summary": "188838",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188838"
      },
      {
        "category": "external",
        "summary": "188840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188840"
      },
      {
        "category": "external",
        "summary": "188842",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188842"
      },
      {
        "category": "external",
        "summary": "188844",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=188844"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0328.json"
      }
    ],
    "title": "Red Hat Security Advisory: firefox security update",
    "tracking": {
      "current_release_date": "2025-01-12T19:22:13+00:00",
      "generator": {
        "date": "2025-01-12T19:22:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.6"
        }
      },
      "id": "RHSA-2006:0328",
      "initial_release_date": "2006-04-14T15:54:00+00:00",
      "revision_history": [
        {
          "date": "2006-04-14T15:54:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2006-04-14T00:00:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-01-12T19:22:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:1.0.8-1.4.1.ia64",
                "product": {
                  "name": "firefox-0:1.0.8-1.4.1.ia64",
                  "product_id": "firefox-0:1.0.8-1.4.1.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.0.8-1.4.1?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.0.8-1.4.1.ia64",
                "product": {
                  "name": "firefox-debuginfo-0:1.0.8-1.4.1.ia64",
                  "product_id": "firefox-debuginfo-0:1.0.8-1.4.1.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.0.8-1.4.1?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:1.0.8-1.4.1.src",
                "product": {
                  "name": "firefox-0:1.0.8-1.4.1.src",
                  "product_id": "firefox-0:1.0.8-1.4.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.0.8-1.4.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:1.0.8-1.4.1.x86_64",
                "product": {
                  "name": "firefox-0:1.0.8-1.4.1.x86_64",
                  "product_id": "firefox-0:1.0.8-1.4.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.0.8-1.4.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
                "product": {
                  "name": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
                  "product_id": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.0.8-1.4.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:1.0.8-1.4.1.i386",
                "product": {
                  "name": "firefox-0:1.0.8-1.4.1.i386",
                  "product_id": "firefox-0:1.0.8-1.4.1.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.0.8-1.4.1?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.0.8-1.4.1.i386",
                "product": {
                  "name": "firefox-debuginfo-0:1.0.8-1.4.1.i386",
                  "product_id": "firefox-debuginfo-0:1.0.8-1.4.1.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.0.8-1.4.1?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:1.0.8-1.4.1.ppc",
                "product": {
                  "name": "firefox-0:1.0.8-1.4.1.ppc",
                  "product_id": "firefox-0:1.0.8-1.4.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.0.8-1.4.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.0.8-1.4.1.ppc",
                "product": {
                  "name": "firefox-debuginfo-0:1.0.8-1.4.1.ppc",
                  "product_id": "firefox-debuginfo-0:1.0.8-1.4.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.0.8-1.4.1?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:1.0.8-1.4.1.s390x",
                "product": {
                  "name": "firefox-0:1.0.8-1.4.1.s390x",
                  "product_id": "firefox-0:1.0.8-1.4.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.0.8-1.4.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390x",
                "product": {
                  "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390x",
                  "product_id": "firefox-debuginfo-0:1.0.8-1.4.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.0.8-1.4.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:1.0.8-1.4.1.s390",
                "product": {
                  "name": "firefox-0:1.0.8-1.4.1.s390",
                  "product_id": "firefox-0:1.0.8-1.4.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.0.8-1.4.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390",
                "product": {
                  "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390",
                  "product_id": "firefox-debuginfo-0:1.0.8-1.4.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.0.8-1.4.1?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.0.8-1.4.1.i386"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.0.8-1.4.1.ia64"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.0.8-1.4.1.ppc"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.0.8-1.4.1.s390"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.0.8-1.4.1.s390x"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.0.8-1.4.1.src"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.0.8-1.4.1.x86_64"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.0.8-1.4.1.i386"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.0.8-1.4.1.ia64"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.0.8-1.4.1.ppc"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.0.8-1.4.1.s390"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.0.8-1.4.1.s390x"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.0.8-1.4.1.src"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.0.8-1.4.1.x86_64"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.0.8-1.4.1.i386"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.0.8-1.4.1.ia64"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.0.8-1.4.1.ppc"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.0.8-1.4.1.s390"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.0.8-1.4.1.s390x"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.0.8-1.4.1.src"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.0.8-1.4.1.x86_64"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.0.8-1.4.1.i386"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.0.8-1.4.1.ia64"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.0.8-1.4.1.ppc"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.0.8-1.4.1.s390"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.0.8-1.4.1.s390x"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.0.8-1.4.1.src"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.0.8-1.4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.0.8-1.4.1.x86_64"
        },
        "product_reference": "firefox-0:1.0.8-1.4.1.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-0748",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618020"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via \"an invalid and non-sensical ordering of table-related tags\" that results in a negative array index.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-0748"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618020",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618020"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0748",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-0748"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0748",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0748"
        }
      ],
      "release_date": "2006-04-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-0749",
      "discovery_date": "2005-12-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "183537"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "nsHTMLContentSink.cpp in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors involving a \"particular sequence of HTML tags\" that leads to memory corruption.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox Tag Order Vulnerability",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-0749"
        },
        {
          "category": "external",
          "summary": "RHBZ#183537",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=183537"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0749",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-0749"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0749",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0749"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Firefox Tag Order Vulnerability"
    },
    {
      "cve": "CVE-2006-1724",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618047"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to DHTML.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1724"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618047",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618047"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1724",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1724"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1724",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1724"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1727",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618048"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to gain chrome privileges via multiple attack vectors related to the use of XBL scripts with \"Print Preview\".",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1727"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618048",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618048"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1727",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1727"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1727",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1727"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1728",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618049"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via unknown vectors related to the crypto.generateCRMFRequest method.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1728"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618049",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618049"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1728",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1728"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1728",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1728"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1729",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618050"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to read arbitrary files by (1) inserting the target filename into a text box, then turning that box into a file upload control, or (2) changing the type of the input control that is associated with an event handler.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1729"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618050",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618050"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1729",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1729"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1729",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1729"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1730",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618051"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via a large number in the CSS letter-spacing property that leads to a heap-based buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1730"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618051",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618051"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1730",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1730"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1730",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1730"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1731",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618052"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1731"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618052",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618052"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1731",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1731"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1731",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1731"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1732",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618053"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to bypass same-origin protections and conduct cross-site scripting (XSS) attacks via unspecified vectors involving the window.controllers array.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1732"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618053",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618053"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1732",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1732"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1732",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1732"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1733",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618054"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) \"by inserting an XBL method into the DOM\u0027s document.body prototype chain.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1733"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618054",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618054"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1733",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1733"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1733",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1733"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1734",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618055"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the \"clone parent\" internal function.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1734"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618055",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618055"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1734",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1734"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1734",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1734"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1735",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618056"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using an eval in an XBL method binding (XBL.method.eval) to create Javascript functions that are compiled with extra privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1735"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618056",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618056"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1735",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1735"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1735",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1735"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1737",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618057"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary bytecode via JavaScript with a large regular expression.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1737"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618057",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618057"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1737",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1737"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1737",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1737"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1738",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618058"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) by changing the (1) -moz-grid and (2) -moz-grid-group display styles.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1738"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618058",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618058"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1738",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1738"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1738",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1738"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1739",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618059"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The CSS border-rendering code in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain Cascading Style Sheets (CSS) that causes an out-of-bounds array write and buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1739"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618059",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618059"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1739",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1739"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1739",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1739"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1740",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618060"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to spoof secure site indicators such as the locked icon by opening the trusted site in a popup window, then changing the location to a malicious site.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1740"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618060",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618060"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1740",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1740"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1740",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1740"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1741",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618061"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) \"using a modal alert to suspend an event handler while a new page is being loaded\", (2) using eval(), and using certain variants involving (3) \"new Script;\" and (4) using window.__proto__ to extend eval, aka \"cross-site JavaScript injection\".",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1741"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618061",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618061"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1741",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1741"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1741",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1741"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1742",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618062"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remote attackers to trigger operations on freed memory and cause memory corruption.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1742"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618062",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618062"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1742",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1742"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1742",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1742"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1790",
      "discovery_date": "2006-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618063"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A regression fix in Mozilla Firefox 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the InstallTrigger.install method, which leads to memory corruption.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.0.8-1.4.1.i386",
          "4AS:firefox-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-0:1.0.8-1.4.1.s390",
          "4AS:firefox-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-0:1.0.8-1.4.1.src",
          "4AS:firefox-0:1.0.8-1.4.1.x86_64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-0:1.0.8-1.4.1.src",
          "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-0:1.0.8-1.4.1.i386",
          "4ES:firefox-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-0:1.0.8-1.4.1.s390",
          "4ES:firefox-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-0:1.0.8-1.4.1.src",
          "4ES:firefox-0:1.0.8-1.4.1.x86_64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-0:1.0.8-1.4.1.i386",
          "4WS:firefox-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-0:1.0.8-1.4.1.s390",
          "4WS:firefox-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-0:1.0.8-1.4.1.src",
          "4WS:firefox-0:1.0.8-1.4.1.x86_64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
          "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1790"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618063",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618063"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1790",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1790"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1790",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1790"
        }
      ],
      "release_date": "2006-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-04-14T15:54:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "4AS:firefox-0:1.0.8-1.4.1.i386",
            "4AS:firefox-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-0:1.0.8-1.4.1.s390",
            "4AS:firefox-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-0:1.0.8-1.4.1.src",
            "4AS:firefox-0:1.0.8-1.4.1.x86_64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4AS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-0:1.0.8-1.4.1.src",
            "4Desktop:firefox-0:1.0.8-1.4.1.x86_64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4Desktop:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-0:1.0.8-1.4.1.i386",
            "4ES:firefox-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-0:1.0.8-1.4.1.s390",
            "4ES:firefox-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-0:1.0.8-1.4.1.src",
            "4ES:firefox-0:1.0.8-1.4.1.x86_64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4ES:firefox-debuginfo-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-0:1.0.8-1.4.1.i386",
            "4WS:firefox-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-0:1.0.8-1.4.1.s390",
            "4WS:firefox-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-0:1.0.8-1.4.1.src",
            "4WS:firefox-0:1.0.8-1.4.1.x86_64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.i386",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ia64",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.ppc",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.s390x",
            "4WS:firefox-debuginfo-0:1.0.8-1.4.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0328"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "security flaw"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.