Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the "clone parent" internal function.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T17:19:49.492Z
Reserved: 2006-04-12T00:00:00
Link: CVE-2006-1734

No data.

Status : Modified
Published: 2006-04-14T10:02:00.000
Modified: 2024-11-21T00:09:37.410
Link: CVE-2006-1734
