{"id":"CVE-2006-1726","details":"Unspecified vulnerability in Firefox and Thunderbird 1.5 before 1.5.0.2, and SeaMonkey before 1.0.1, allows remote attackers to bypass the js_ValueToFunctionObject check and execute arbitrary code via unknown vectors involving setTimeout and Firefox' ForEach method.","modified":"2026-04-10T03:37:30.135369Z","published":"2006-04-14T10:02:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/19631"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19649"},{"type":"ADVISORY","url":"http://secunia.com/advisories/22065"},{"type":"ADVISORY","url":"http://secunia.com/advisories/22066"},{"type":"ADVISORY","url":"http://www.mozilla.org/security/announce/2006/mfsa2006-28.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/1356"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/3748"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/3749"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/0083"},{"type":"FIX","url":"http://www.mozilla.org/security/announce/2006/mfsa2006-28.html"},{"type":"WEB","url":"http://securitytracker.com/id?1015931"},{"type":"WEB","url":"http://securitytracker.com/id?1015932"},{"type":"WEB","url":"http://securitytracker.com/id?1015933"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/968814"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/434524/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/446657/100/200/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/446658/100/200/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/17516"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA06-107A.html"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25825"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1968"}],"schema_version":"1.7.5"}