{"api_version":"1","generated_at":"2026-04-24T22:08:36+00:00","cve":"CVE-2006-1942","urls":{"html":"https://cve.report/CVE-2006-1942","api":"https://cve.report/api/cve/CVE-2006-1942.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-1942","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-1942"},"summary":{"title":"CVE-2006-1942","description":"Mozilla Firefox 1.5.0.2 and possibly other versions before 1.5.0.4, Netscape 8.1, 8.0.4, and 7.2, and K-Meleon 0.9.13 allows user-assisted remote attackers to open local files via a web page with an IMG element containing a SRC attribute with a non-image file:// URL, then tricking the user into selecting View Image for the broken image, as demonstrated using a .wma file to launch Windows Media Player, or by referencing an \"alternate web page.\"","state":"PUBLISHED","assigner":"mitre","published_at":"2006-04-20 22:02:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5.1","severity":"","vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/advisories/21324","name":"http://secunia.com/advisories/21324","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Debian update for mozilla-thunderbird - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3748","name":"http://www.vupen.com/english/advisories/2006/3748","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22066","name":"http://secunia.com/advisories/22066","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"HP-UX update for firefox - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016202","name":"http://securitytracker.com/id?1016202","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Mozilla Firefox Bugs Permit Arbitrary Code Execution, Cross-Site Scripting, and HTTP Response Smuggling","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/433539/30/5070/threaded","name":"http://www.securityfocus.com/archive/1/433539/30/5070/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25925","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25925","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mozilla.org/security/announce/2006/mfsa2006-39.html","name":"http://www.mozilla.org/security/announce/2006/mfsa2006-39.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"MFSA 2006-39: \"View Image\" local resource linking (Windows)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-1134","name":"http://www.debian.org/security/2006/dsa-1134","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-1134-1 mozilla-thunderbird","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=334341","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=334341","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"334341 – [FIX]Using image tags with a non image file, and selected view image, file will still load up, allowing access to system resources","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20376","name":"http://secunia.com/advisories/20376","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Firefox Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2006_35_mozilla.html","name":"http://www.novell.com/linux/security/advisories/2006_35_mozilla.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/20063","name":"http://secunia.com/advisories/20063","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Mozilla Suite \"View Image\" Local Resource Linking Weakness - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gavinsharp.com/tmp/ImageVuln.html","name":"http://www.gavinsharp.com/tmp/ImageVuln.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Bug 334341","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/2106","name":"http://www.vupen.com/english/advisories/2006/2106","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/18228","name":"http://www.securityfocus.com/bid/18228","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Mozilla Firefox, SeaMonkey, Camino, and Thunderbird Multiple Remote Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.debian.org/security/2006/dsa-1120","name":"http://www.debian.org/security/2006/dsa-1120","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-1120-1 mozilla-firefox","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/0083","name":"http://www.vupen.com/english/advisories/2008/0083","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/446658/100/200/threaded","name":"http://www.securityfocus.com/archive/1/446658/100/200/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.networksecurity.fi/advisories/netscape-view-image.html","name":"http://www.networksecurity.fi/advisories/netscape-view-image.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"This domain name is registered with Netim","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-1118","name":"http://www.debian.org/security/2006/dsa-1118","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-1118-1 mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/435795/100/0/threaded","name":"http://www.securityfocus.com/archive/1/435795/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/431267/100/0/threaded","name":"http://www.securityfocus.com/archive/1/431267/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19988","name":"http://secunia.com/advisories/19988","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Netscape \"View Image\" Local Resource Linking Weakness - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/24713","name":"http://www.osvdb.org/24713","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.securityfocus.com/archive/1/433138/100/0/threaded","name":"http://www.securityfocus.com/archive/1/433138/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21183","name":"http://secunia.com/advisories/21183","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Debian update for mozilla - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21176","name":"http://secunia.com/advisories/21176","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Debian update for mozilla-firefox - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19698","name":"http://secunia.com/advisories/19698","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Firefox \"View Image\" Local Resource Linking Weakness - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-1942","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-1942","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"1942","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"k-meleon_project","cpe5":"k-meleon","cpe6":"0.9.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1942","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"1.5.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1942","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"navigator","cpe6":"7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1942","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"navigator","cpe6":"8.0.40","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1942","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"navigator","cpe6":"8.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"1942","cve":"CVE-2006-1942","epss":"0.029400000","percentile":"0.864560000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:48"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T17:27:29.865Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"21176","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/21176"},{"name":"ADV-2006-3748","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/3748"},{"name":"24713","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/24713"},{"name":"19698","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19698"},{"name":"20060418 Another flaw in Firefox 1.5.0.2: to open files from remote","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/431267/100/0/threaded"},{"name":"20063","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20063"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.mozilla.org/security/announce/2006/mfsa2006-39.html"},{"name":"firefox-viewimage-security-bypass(25925)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25925"},{"name":"20060505 Firefox 1.5.0.3 code execution exploit","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/433138/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.networksecurity.fi/advisories/netscape-view-image.html"},{"name":"20060602 rPSA-2006-0091-1 firefox thunderbird","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/435795/100/0/threaded"},{"name":"20376","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20376"},{"name":"1016202","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016202"},{"name":"18228","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/18228"},{"name":"ADV-2008-0083","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"name":"SSRT061181","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www.securityfocus.com/archive/1/446658/100/200/threaded"},{"name":"DSA-1118","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1118"},{"name":"HPSBUX02153","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www.securityfocus.com/archive/1/446658/100/200/threaded"},{"name":"DSA-1120","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1120"},{"name":"19988","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19988"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.gavinsharp.com/tmp/ImageVuln.html"},{"name":"DSA-1134","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1134"},{"name":"21324","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/21324"},{"name":"21183","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/21183"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=334341"},{"name":"22066","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22066"},{"name":"SUSE-SA:2006:035","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"},{"name":"ADV-2006-2106","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/2106"},{"name":"20060507 Re: Firefox 1.5.0.3 code execution exploit","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/433539/30/5070/threaded"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-04-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"Mozilla Firefox 1.5.0.2 and possibly other versions before 1.5.0.4, Netscape 8.1, 8.0.4, and 7.2, and K-Meleon 0.9.13 allows user-assisted remote attackers to open local files via a web page with an IMG element containing a SRC attribute with a non-image file:// URL, then tricking the user into selecting View Image for the broken image, as demonstrated using a .wma file to launch Windows Media Player, or by referencing an \"alternate web page.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-18T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"21176","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/21176"},{"name":"ADV-2006-3748","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/3748"},{"name":"24713","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/24713"},{"name":"19698","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19698"},{"name":"20060418 Another flaw in Firefox 1.5.0.2: to open files from remote","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/431267/100/0/threaded"},{"name":"20063","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20063"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.mozilla.org/security/announce/2006/mfsa2006-39.html"},{"name":"firefox-viewimage-security-bypass(25925)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25925"},{"name":"20060505 Firefox 1.5.0.3 code execution exploit","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/433138/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.networksecurity.fi/advisories/netscape-view-image.html"},{"name":"20060602 rPSA-2006-0091-1 firefox thunderbird","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/435795/100/0/threaded"},{"name":"20376","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20376"},{"name":"1016202","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016202"},{"name":"18228","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/18228"},{"name":"ADV-2008-0083","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"name":"SSRT061181","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www.securityfocus.com/archive/1/446658/100/200/threaded"},{"name":"DSA-1118","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1118"},{"name":"HPSBUX02153","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www.securityfocus.com/archive/1/446658/100/200/threaded"},{"name":"DSA-1120","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1120"},{"name":"19988","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19988"},{"tags":["x_refsource_MISC"],"url":"http://www.gavinsharp.com/tmp/ImageVuln.html"},{"name":"DSA-1134","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1134"},{"name":"21324","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/21324"},{"name":"21183","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/21183"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=334341"},{"name":"22066","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22066"},{"name":"SUSE-SA:2006:035","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"},{"name":"ADV-2006-2106","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/2106"},{"name":"20060507 Re: Firefox 1.5.0.3 code execution exploit","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/433539/30/5070/threaded"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-1942","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Mozilla Firefox 1.5.0.2 and possibly other versions before 1.5.0.4, Netscape 8.1, 8.0.4, and 7.2, and K-Meleon 0.9.13 allows user-assisted remote attackers to open local files via a web page with an IMG element containing a SRC attribute with a non-image file:// URL, then tricking the user into selecting View Image for the broken image, as demonstrated using a .wma file to launch Windows Media Player, or by referencing an \"alternate web page.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"21176","refsource":"SECUNIA","url":"http://secunia.com/advisories/21176"},{"name":"ADV-2006-3748","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/3748"},{"name":"24713","refsource":"OSVDB","url":"http://www.osvdb.org/24713"},{"name":"19698","refsource":"SECUNIA","url":"http://secunia.com/advisories/19698"},{"name":"20060418 Another flaw in Firefox 1.5.0.2: to open files from remote","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/431267/100/0/threaded"},{"name":"20063","refsource":"SECUNIA","url":"http://secunia.com/advisories/20063"},{"name":"http://www.mozilla.org/security/announce/2006/mfsa2006-39.html","refsource":"CONFIRM","url":"http://www.mozilla.org/security/announce/2006/mfsa2006-39.html"},{"name":"firefox-viewimage-security-bypass(25925)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25925"},{"name":"20060505 Firefox 1.5.0.3 code execution exploit","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/433138/100/0/threaded"},{"name":"http://www.networksecurity.fi/advisories/netscape-view-image.html","refsource":"MISC","url":"http://www.networksecurity.fi/advisories/netscape-view-image.html"},{"name":"20060602 rPSA-2006-0091-1 firefox thunderbird","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/435795/100/0/threaded"},{"name":"20376","refsource":"SECUNIA","url":"http://secunia.com/advisories/20376"},{"name":"1016202","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016202"},{"name":"18228","refsource":"BID","url":"http://www.securityfocus.com/bid/18228"},{"name":"ADV-2008-0083","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/0083"},{"name":"SSRT061181","refsource":"HP","url":"http://www.securityfocus.com/archive/1/446658/100/200/threaded"},{"name":"DSA-1118","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-1118"},{"name":"HPSBUX02153","refsource":"HP","url":"http://www.securityfocus.com/archive/1/446658/100/200/threaded"},{"name":"DSA-1120","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-1120"},{"name":"19988","refsource":"SECUNIA","url":"http://secunia.com/advisories/19988"},{"name":"http://www.gavinsharp.com/tmp/ImageVuln.html","refsource":"MISC","url":"http://www.gavinsharp.com/tmp/ImageVuln.html"},{"name":"DSA-1134","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-1134"},{"name":"21324","refsource":"SECUNIA","url":"http://secunia.com/advisories/21324"},{"name":"21183","refsource":"SECUNIA","url":"http://secunia.com/advisories/21183"},{"name":"https://bugzilla.mozilla.org/show_bug.cgi?id=334341","refsource":"CONFIRM","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=334341"},{"name":"22066","refsource":"SECUNIA","url":"http://secunia.com/advisories/22066"},{"name":"SUSE-SA:2006:035","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"},{"name":"ADV-2006-2106","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/2106"},{"name":"20060507 Re: Firefox 1.5.0.3 code execution exploit","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/433539/30/5070/threaded"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-1942","datePublished":"2006-04-20T22:00:00.000Z","dateReserved":"2006-04-20T00:00:00.000Z","dateUpdated":"2024-08-07T17:27:29.865Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-04-20 22:02:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:k-meleon_project:k-meleon:0.9.13:*:*:*:*:*:*:*","matchCriteriaId":"D9F05337-F4CB-4829-A086-1164CAC34BAA"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:7.2:*:*:*:*:*:*:*","matchCriteriaId":"842CBD30-B4BA-4FCF-9152-9DBEBE59857C"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:8.0.40:*:*:*:*:*:*:*","matchCriteriaId":"4877D2D7-139E-4582-B023-53E1E1E1D124"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:8.1:*:*:*:*:*:*:*","matchCriteriaId":"D673003C-0491-4C94-8907-5E36BB5EB9AD"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"1942","Ordinal":"1","Title":"CVE-2006-1942","CVE":"CVE-2006-1942","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"1942","Ordinal":"1","NoteData":"Mozilla Firefox 1.5.0.2 and possibly other versions before 1.5.0.4, Netscape 8.1, 8.0.4, and 7.2, and K-Meleon 0.9.13 allows user-assisted remote attackers to open local files via a web page with an IMG element containing a SRC attribute with a non-image file:// URL, then tricking the user into selecting View Image for the broken image, as demonstrated using a .wma file to launch Windows Media Player, or by referencing an \"alternate web page.\"","Type":"Description","Title":"CVE-2006-1942"},{"CveYear":"2006","CveId":"1942","Ordinal":"2","NoteData":"2006-04-20","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"1942","Ordinal":"3","NoteData":"2018-10-18","Type":"Other","Title":"Modified"}]}}}