Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-vqn8-j5bn-zqbr
Summary
Multiple vulnerabilities have been reported in Mozilla Thunderbird, some of
    which may allow the remote execution of arbitrary code.
Aliases
0
alias CVE-2006-6501
Fixed_packages
0
url pkg:deb/debian/firefox@45.0-1?distro=sid
purl pkg:deb/debian/firefox@45.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@45.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox-esr@45.0esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@45.0esr-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@45.0esr-1%3Fdistro=trixie
5
url pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie
purl pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-5dw5-vpt8-zqbz
4
vulnerability VCID-61r1-arbe-dke4
5
vulnerability VCID-7jt2-zr49-7ye5
6
vulnerability VCID-95et-ezmb-buau
7
vulnerability VCID-9ag7-z86d-nba9
8
vulnerability VCID-9nbw-7c9e-13af
9
vulnerability VCID-av7u-3g4m-mugm
10
vulnerability VCID-bwth-uepr-z7a3
11
vulnerability VCID-cjsm-7gxr-8ygw
12
vulnerability VCID-d16s-p141-qbft
13
vulnerability VCID-fxjm-ywug-f3d5
14
vulnerability VCID-hk2m-rbdy-nqhc
15
vulnerability VCID-ma29-qa7e-9qb4
16
vulnerability VCID-nge1-4cvg-zqb2
17
vulnerability VCID-nyum-jpbc-abew
18
vulnerability VCID-p6yz-xs58-u3gm
19
vulnerability VCID-pfmd-zv8f-8bfc
20
vulnerability VCID-q689-wneh-hbdq
21
vulnerability VCID-q8qp-5szp-mfe8
22
vulnerability VCID-qbzp-euvv-q7c7
23
vulnerability VCID-ruqn-mk9t-57hb
24
vulnerability VCID-tv7r-qf2c-dqbm
25
vulnerability VCID-w98r-yagc-kkec
26
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie
6
url pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie
7
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie
8
url pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-f81v-9fv8-93cd
3
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie
9
url pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-61r1-arbe-dke4
4
vulnerability VCID-7jt2-zr49-7ye5
5
vulnerability VCID-95et-ezmb-buau
6
vulnerability VCID-9nbw-7c9e-13af
7
vulnerability VCID-av7u-3g4m-mugm
8
vulnerability VCID-bwth-uepr-z7a3
9
vulnerability VCID-cjsm-7gxr-8ygw
10
vulnerability VCID-d16s-p141-qbft
11
vulnerability VCID-f81v-9fv8-93cd
12
vulnerability VCID-fxjm-ywug-f3d5
13
vulnerability VCID-hk2m-rbdy-nqhc
14
vulnerability VCID-ma29-qa7e-9qb4
15
vulnerability VCID-nge1-4cvg-zqb2
16
vulnerability VCID-nyum-jpbc-abew
17
vulnerability VCID-p6yz-xs58-u3gm
18
vulnerability VCID-pfmd-zv8f-8bfc
19
vulnerability VCID-q689-wneh-hbdq
20
vulnerability VCID-q8qp-5szp-mfe8
21
vulnerability VCID-ruqn-mk9t-57hb
22
vulnerability VCID-tv7r-qf2c-dqbm
23
vulnerability VCID-w98r-yagc-kkec
24
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie
10
url pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie
11
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.9
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.9
12
url pkg:ebuild/mail-client/mozilla-thunderbird-bin@1.5.0.9
purl pkg:ebuild/mail-client/mozilla-thunderbird-bin@1.5.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird-bin@1.5.0.9
13
url pkg:ebuild/www-client/mozilla-firefox@1.5.0.9
purl pkg:ebuild/www-client/mozilla-firefox@1.5.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/mozilla-firefox@1.5.0.9
14
url pkg:ebuild/www-client/mozilla-firefox-bin@1.5.0.9
purl pkg:ebuild/www-client/mozilla-firefox-bin@1.5.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/mozilla-firefox-bin@1.5.0.9
15
url pkg:ebuild/www-client/seamonkey@1.0.7
purl pkg:ebuild/www-client/seamonkey@1.0.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.0.7
16
url pkg:mozilla/SeaMonkey@1.0.7
purl pkg:mozilla/SeaMonkey@1.0.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.7
Affected_packages
0
url pkg:rpm/redhat/devhelp@0.10-0.6?arch=el4
purl pkg:rpm/redhat/devhelp@0.10-0.6?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41du-jtb4-8bdr
1
vulnerability VCID-c4pj-vwxp-tfb8
2
vulnerability VCID-eauw-p8kn-yqdt
3
vulnerability VCID-gr9t-39mj-2bbe
4
vulnerability VCID-ne9e-2jg4-mbd5
5
vulnerability VCID-vqn8-j5bn-zqbr
6
vulnerability VCID-x5gg-np6m-s7c9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/devhelp@0.10-0.6%3Farch=el4
1
url pkg:rpm/redhat/firefox@1.5.0.9-0.1?arch=el4
purl pkg:rpm/redhat/firefox@1.5.0.9-0.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c4pj-vwxp-tfb8
1
vulnerability VCID-eauw-p8kn-yqdt
2
vulnerability VCID-gr9t-39mj-2bbe
3
vulnerability VCID-ne9e-2jg4-mbd5
4
vulnerability VCID-vqn8-j5bn-zqbr
5
vulnerability VCID-x5gg-np6m-s7c9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@1.5.0.9-0.1%3Farch=el4
2
url pkg:rpm/redhat/seamonkey@1.0.7-0.1?arch=el3
purl pkg:rpm/redhat/seamonkey@1.0.7-0.1?arch=el3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41du-jtb4-8bdr
1
vulnerability VCID-c4pj-vwxp-tfb8
2
vulnerability VCID-eauw-p8kn-yqdt
3
vulnerability VCID-gr9t-39mj-2bbe
4
vulnerability VCID-ne9e-2jg4-mbd5
5
vulnerability VCID-vqn8-j5bn-zqbr
6
vulnerability VCID-x5gg-np6m-s7c9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.7-0.1%3Farch=el3
3
url pkg:rpm/redhat/seamonkey@1.0.7-0.1?arch=el4
purl pkg:rpm/redhat/seamonkey@1.0.7-0.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41du-jtb4-8bdr
1
vulnerability VCID-c4pj-vwxp-tfb8
2
vulnerability VCID-eauw-p8kn-yqdt
3
vulnerability VCID-gr9t-39mj-2bbe
4
vulnerability VCID-ne9e-2jg4-mbd5
5
vulnerability VCID-vqn8-j5bn-zqbr
6
vulnerability VCID-x5gg-np6m-s7c9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.7-0.1%3Farch=el4
4
url pkg:rpm/redhat/seamonkey@1.0.7-0.1?arch=el2
purl pkg:rpm/redhat/seamonkey@1.0.7-0.1?arch=el2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41du-jtb4-8bdr
1
vulnerability VCID-c4pj-vwxp-tfb8
2
vulnerability VCID-eauw-p8kn-yqdt
3
vulnerability VCID-gr9t-39mj-2bbe
4
vulnerability VCID-ne9e-2jg4-mbd5
5
vulnerability VCID-vqn8-j5bn-zqbr
6
vulnerability VCID-x5gg-np6m-s7c9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.7-0.1%3Farch=el2
5
url pkg:rpm/redhat/thunderbird@1.5.0.9-0.1?arch=el4
purl pkg:rpm/redhat/thunderbird@1.5.0.9-0.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41du-jtb4-8bdr
1
vulnerability VCID-c4pj-vwxp-tfb8
2
vulnerability VCID-eauw-p8kn-yqdt
3
vulnerability VCID-gr9t-39mj-2bbe
4
vulnerability VCID-ne9e-2jg4-mbd5
5
vulnerability VCID-vqn8-j5bn-zqbr
6
vulnerability VCID-x5gg-np6m-s7c9
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@1.5.0.9-0.1%3Farch=el4
References
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
1
reference_url http://fedoranews.org/cms/node/2297
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2297
2
reference_url http://fedoranews.org/cms/node/2338
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2338
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
4
reference_url http://rhn.redhat.com/errata/RHSA-2006-0758.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0758.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0759.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0759.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2006-0760.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0760.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6501.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6501.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6501
reference_id
reference_type
scores
0
value 0.28742
scoring_system epss
scoring_elements 0.9656
published_at 2026-04-24T12:55:00Z
1
value 0.28742
scoring_system epss
scoring_elements 0.96557
published_at 2026-04-18T12:55:00Z
2
value 0.28742
scoring_system epss
scoring_elements 0.96559
published_at 2026-04-21T12:55:00Z
3
value 0.28742
scoring_system epss
scoring_elements 0.96511
published_at 2026-04-01T12:55:00Z
4
value 0.28742
scoring_system epss
scoring_elements 0.9652
published_at 2026-04-02T12:55:00Z
5
value 0.28742
scoring_system epss
scoring_elements 0.96525
published_at 2026-04-04T12:55:00Z
6
value 0.28742
scoring_system epss
scoring_elements 0.96528
published_at 2026-04-07T12:55:00Z
7
value 0.28742
scoring_system epss
scoring_elements 0.96537
published_at 2026-04-08T12:55:00Z
8
value 0.28742
scoring_system epss
scoring_elements 0.96539
published_at 2026-04-09T12:55:00Z
9
value 0.28742
scoring_system epss
scoring_elements 0.96541
published_at 2026-04-11T12:55:00Z
10
value 0.28742
scoring_system epss
scoring_elements 0.96542
published_at 2026-04-12T12:55:00Z
11
value 0.28742
scoring_system epss
scoring_elements 0.96544
published_at 2026-04-13T12:55:00Z
12
value 0.28742
scoring_system epss
scoring_elements 0.96551
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6501
9
reference_url http://secunia.com/advisories/23282
reference_id
reference_type
scores
url http://secunia.com/advisories/23282
10
reference_url http://secunia.com/advisories/23420
reference_id
reference_type
scores
url http://secunia.com/advisories/23420
11
reference_url http://secunia.com/advisories/23422
reference_id
reference_type
scores
url http://secunia.com/advisories/23422
12
reference_url http://secunia.com/advisories/23433
reference_id
reference_type
scores
url http://secunia.com/advisories/23433
13
reference_url http://secunia.com/advisories/23439
reference_id
reference_type
scores
url http://secunia.com/advisories/23439
14
reference_url http://secunia.com/advisories/23440
reference_id
reference_type
scores
url http://secunia.com/advisories/23440
15
reference_url http://secunia.com/advisories/23468
reference_id
reference_type
scores
url http://secunia.com/advisories/23468
16
reference_url http://secunia.com/advisories/23514
reference_id
reference_type
scores
url http://secunia.com/advisories/23514
17
reference_url http://secunia.com/advisories/23545
reference_id
reference_type
scores
url http://secunia.com/advisories/23545
18
reference_url http://secunia.com/advisories/23589
reference_id
reference_type
scores
url http://secunia.com/advisories/23589
19
reference_url http://secunia.com/advisories/23591
reference_id
reference_type
scores
url http://secunia.com/advisories/23591
20
reference_url http://secunia.com/advisories/23598
reference_id
reference_type
scores
url http://secunia.com/advisories/23598
21
reference_url http://secunia.com/advisories/23601
reference_id
reference_type
scores
url http://secunia.com/advisories/23601
22
reference_url http://secunia.com/advisories/23614
reference_id
reference_type
scores
url http://secunia.com/advisories/23614
23
reference_url http://secunia.com/advisories/23618
reference_id
reference_type
scores
url http://secunia.com/advisories/23618
24
reference_url http://secunia.com/advisories/23672
reference_id
reference_type
scores
url http://secunia.com/advisories/23672
25
reference_url http://secunia.com/advisories/23692
reference_id
reference_type
scores
url http://secunia.com/advisories/23692
26
reference_url http://secunia.com/advisories/23988
reference_id
reference_type
scores
url http://secunia.com/advisories/23988
27
reference_url http://secunia.com/advisories/24078
reference_id
reference_type
scores
url http://secunia.com/advisories/24078
28
reference_url http://secunia.com/advisories/24390
reference_id
reference_type
scores
url http://secunia.com/advisories/24390
29
reference_url http://security.gentoo.org/glsa/glsa-200701-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-02.xml
30
reference_url http://securitytracker.com/id?1017403
reference_id
reference_type
scores
url http://securitytracker.com/id?1017403
31
reference_url http://securitytracker.com/id?1017404
reference_id
reference_type
scores
url http://securitytracker.com/id?1017404
32
reference_url http://securitytracker.com/id?1017407
reference_id
reference_type
scores
url http://securitytracker.com/id?1017407
33
reference_url https://issues.rpath.com/browse/RPL-883
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-883
34
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9746
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9746
35
reference_url http://www.debian.org/security/2007/dsa-1253
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1253
36
reference_url http://www.debian.org/security/2007/dsa-1258
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1258
37
reference_url http://www.debian.org/security/2007/dsa-1265
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1265
38
reference_url http://www.gentoo.org/security/en/glsa/glsa-200701-03.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200701-03.xml
39
reference_url http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml
40
reference_url http://www.kb.cert.org/vuls/id/263412
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/263412
41
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:010
42
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:011
43
reference_url http://www.mozilla.org/security/announce/2006/mfsa2006-70.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2006/mfsa2006-70.html
44
reference_url http://www.novell.com/linux/security/advisories/2006_80_mozilla.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_80_mozilla.html
45
reference_url http://www.novell.com/linux/security/advisories/2007_06_mozilla.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_06_mozilla.html
46
reference_url http://www.securityfocus.com/archive/1/455145/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/455145/100/0/threaded
47
reference_url http://www.securityfocus.com/archive/1/455728/100/200/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/455728/100/200/threaded
48
reference_url http://www.securityfocus.com/bid/21668
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21668
49
reference_url http://www.ubuntu.com/usn/usn-398-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-398-1
50
reference_url http://www.ubuntu.com/usn/usn-398-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-398-2
51
reference_url http://www.ubuntu.com/usn/usn-400-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-400-1
52
reference_url http://www.us-cert.gov/cas/techalerts/TA06-354A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA06-354A.html
53
reference_url http://www.vupen.com/english/advisories/2006/5068
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/5068
54
reference_url http://www.vupen.com/english/advisories/2008/0083
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0083
55
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618245
reference_id 1618245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618245
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501
reference_id CVE-2006-6501
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6501
reference_id CVE-2006-6501
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-6501
66
reference_url https://security.gentoo.org/glsa/200701-02
reference_id GLSA-200701-02
reference_type
scores
url https://security.gentoo.org/glsa/200701-02
67
reference_url https://security.gentoo.org/glsa/200701-03
reference_id GLSA-200701-03
reference_type
scores
url https://security.gentoo.org/glsa/200701-03
68
reference_url https://security.gentoo.org/glsa/200701-04
reference_id GLSA-200701-04
reference_type
scores
url https://security.gentoo.org/glsa/200701-04
69
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-70
reference_id mfsa2006-70
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-70
70
reference_url https://access.redhat.com/errata/RHSA-2006:0758
reference_id RHSA-2006:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0758
71
reference_url https://access.redhat.com/errata/RHSA-2006:0759
reference_id RHSA-2006:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0759
72
reference_url https://access.redhat.com/errata/RHSA-2006:0760
reference_id RHSA-2006:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0760
73
reference_url https://usn.ubuntu.com/398-1/
reference_id USN-398-1
reference_type
scores
url https://usn.ubuntu.com/398-1/
74
reference_url https://usn.ubuntu.com/398-2/
reference_id USN-398-2
reference_type
scores
url https://usn.ubuntu.com/398-2/
75
reference_url https://usn.ubuntu.com/400-1/
reference_id USN-400-1
reference_type
scores
url https://usn.ubuntu.com/400-1/
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score6.8 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-vqn8-j5bn-zqbr