Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9934
https://issues.rpath.com/browse/RPL-537
https://issues.rpath.com/browse/RPL-536
https://exchange.xforce.ibmcloud.com/vulnerabilities/27992
http://www.vupen.com/english/advisories/2008/0083
http://www.vupen.com/english/advisories/2007/2350
http://www.vupen.com/english/advisories/2006/3749
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/2998
http://www.us-cert.gov/cas/techalerts/TA06-208A.html
http://www.ubuntu.com/usn/usn-361-1
http://www.ubuntu.com/usn/usn-354-1
http://www.ubuntu.com/usn/usn-350-1
http://www.securityfocus.com/bid/19181
http://www.securityfocus.com/archive/1/446658/100/200/threaded
http://www.securityfocus.com/archive/1/446657/100/200/threaded
http://www.securityfocus.com/archive/1/441333/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2006-0611.html
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0608.html
http://www.redhat.com/support/errata/RHSA-2006-0594.html
http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html
http://www.mozilla.org/security/announce/2006/mfsa2006-55.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.kb.cert.org/vuls/id/527676
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml
http://www.debian.org/security/2006/dsa-1161
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102971-1
http://securitytracker.com/id?1016588
http://securitytracker.com/id?1016587
http://securitytracker.com/id?1016586
http://security.gentoo.org/glsa/glsa-200608-04.xml
http://security.gentoo.org/glsa/glsa-200608-02.xml
http://secunia.com/advisories/25839
http://secunia.com/advisories/22342
http://secunia.com/advisories/22210
http://secunia.com/advisories/22066
http://secunia.com/advisories/22065
http://secunia.com/advisories/22055
http://secunia.com/advisories/21675
http://secunia.com/advisories/21631
http://secunia.com/advisories/21607
http://secunia.com/advisories/21532
http://secunia.com/advisories/21529
http://secunia.com/advisories/21361
http://secunia.com/advisories/21358
http://secunia.com/advisories/21343
http://secunia.com/advisories/21336
http://secunia.com/advisories/21275
http://secunia.com/advisories/21270
http://secunia.com/advisories/21269
http://secunia.com/advisories/21262
http://secunia.com/advisories/21250
http://secunia.com/advisories/21246
http://secunia.com/advisories/21243
http://secunia.com/advisories/21229
http://secunia.com/advisories/21228
http://secunia.com/advisories/21216