CVE-2006-6499

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-6499
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2006-6499.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2006-6499
Downstream
Published
2006-12-20T01:28:00Z
Modified
2025-08-09T20:01:27Z
Summary
[none]
Details

The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.

References

Affected packages