Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-vh98-ydt4-zbc6
Summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    execution of arbitrary code.
Aliases
0
alias CVE-2008-2807
Fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@2.0.0.16
purl pkg:ebuild/mail-client/mozilla-thunderbird@2.0.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@2.0.0.16
1
url pkg:ebuild/mail-client/mozilla-thunderbird-bin@2.0.0.16
purl pkg:ebuild/mail-client/mozilla-thunderbird-bin@2.0.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird-bin@2.0.0.16
2
url pkg:ebuild/net-libs/xulrunner@1.1.11
purl pkg:ebuild/net-libs/xulrunner@1.1.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.11
3
url pkg:ebuild/net-libs/xulrunner@1.8.1.16
purl pkg:ebuild/net-libs/xulrunner@1.8.1.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.16
4
url pkg:ebuild/net-libs/xulrunner@2.0.0.16
purl pkg:ebuild/net-libs/xulrunner@2.0.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.16
5
url pkg:ebuild/net-libs/xulrunner-bin@1.1.11
purl pkg:ebuild/net-libs/xulrunner-bin@1.1.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner-bin@1.1.11
6
url pkg:ebuild/net-libs/xulrunner-bin@1.8.1.16
purl pkg:ebuild/net-libs/xulrunner-bin@1.8.1.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner-bin@1.8.1.16
7
url pkg:ebuild/net-libs/xulrunner-bin@2.0.0.16
purl pkg:ebuild/net-libs/xulrunner-bin@2.0.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner-bin@2.0.0.16
8
url pkg:ebuild/www-client/mozilla-firefox@2.0.0.16
purl pkg:ebuild/www-client/mozilla-firefox@2.0.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/mozilla-firefox@2.0.0.16
9
url pkg:ebuild/www-client/mozilla-firefox-bin@2.0.0.16
purl pkg:ebuild/www-client/mozilla-firefox-bin@2.0.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/mozilla-firefox-bin@2.0.0.16
10
url pkg:ebuild/www-client/seamonkey@1.1.11
purl pkg:ebuild/www-client/seamonkey@1.1.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.11
11
url pkg:ebuild/www-client/seamonkey@2.0.0.16
purl pkg:ebuild/www-client/seamonkey@2.0.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.16
12
url pkg:ebuild/www-client/seamonkey-bin@1.1.11
purl pkg:ebuild/www-client/seamonkey-bin@1.1.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.11
13
url pkg:ebuild/www-client/seamonkey-bin@2.0.0.16
purl pkg:ebuild/www-client/seamonkey-bin@2.0.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.0.0.16
14
url pkg:mozilla/SeaMonkey@1.1.10
purl pkg:mozilla/SeaMonkey@1.1.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.10
Affected_packages
0
url pkg:rpm/redhat/devhelp@0.12-17?arch=el5
purl pkg:rpm/redhat/devhelp@0.12-17?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-fedm-5fp4-euaw
3
vulnerability VCID-fv7q-4y8u-cugf
4
vulnerability VCID-gyt3-v717-w7fc
5
vulnerability VCID-h4db-jdp2-hfb6
6
vulnerability VCID-msn9-shuy-vbbu
7
vulnerability VCID-sank-5xaa-cbha
8
vulnerability VCID-u412-z7y4-tqeq
9
vulnerability VCID-uwgk-ywu3-b7en
10
vulnerability VCID-v8ea-efv9-kbc5
11
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/devhelp@0.12-17%3Farch=el5
1
url pkg:rpm/redhat/firefox@1.5.0.12-0.19?arch=el4
purl pkg:rpm/redhat/firefox@1.5.0.12-0.19?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-fedm-5fp4-euaw
3
vulnerability VCID-fv7q-4y8u-cugf
4
vulnerability VCID-gyt3-v717-w7fc
5
vulnerability VCID-h4db-jdp2-hfb6
6
vulnerability VCID-msn9-shuy-vbbu
7
vulnerability VCID-sank-5xaa-cbha
8
vulnerability VCID-u412-z7y4-tqeq
9
vulnerability VCID-uwgk-ywu3-b7en
10
vulnerability VCID-v8ea-efv9-kbc5
11
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@1.5.0.12-0.19%3Farch=el4
2
url pkg:rpm/redhat/firefox@3.0-2?arch=el5
purl pkg:rpm/redhat/firefox@3.0-2?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-fedm-5fp4-euaw
3
vulnerability VCID-fv7q-4y8u-cugf
4
vulnerability VCID-gyt3-v717-w7fc
5
vulnerability VCID-h4db-jdp2-hfb6
6
vulnerability VCID-msn9-shuy-vbbu
7
vulnerability VCID-sank-5xaa-cbha
8
vulnerability VCID-u412-z7y4-tqeq
9
vulnerability VCID-uwgk-ywu3-b7en
10
vulnerability VCID-v8ea-efv9-kbc5
11
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@3.0-2%3Farch=el5
3
url pkg:rpm/redhat/seamonkey@1.0.9-0.17?arch=el2
purl pkg:rpm/redhat/seamonkey@1.0.9-0.17?arch=el2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-fedm-5fp4-euaw
3
vulnerability VCID-fv7q-4y8u-cugf
4
vulnerability VCID-gyt3-v717-w7fc
5
vulnerability VCID-h4db-jdp2-hfb6
6
vulnerability VCID-msn9-shuy-vbbu
7
vulnerability VCID-sank-5xaa-cbha
8
vulnerability VCID-u412-z7y4-tqeq
9
vulnerability VCID-uwgk-ywu3-b7en
10
vulnerability VCID-v8ea-efv9-kbc5
11
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-0.17%3Farch=el2
4
url pkg:rpm/redhat/seamonkey@1.0.9-0.20?arch=el3
purl pkg:rpm/redhat/seamonkey@1.0.9-0.20?arch=el3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-fedm-5fp4-euaw
3
vulnerability VCID-fv7q-4y8u-cugf
4
vulnerability VCID-gyt3-v717-w7fc
5
vulnerability VCID-h4db-jdp2-hfb6
6
vulnerability VCID-msn9-shuy-vbbu
7
vulnerability VCID-sank-5xaa-cbha
8
vulnerability VCID-u412-z7y4-tqeq
9
vulnerability VCID-uwgk-ywu3-b7en
10
vulnerability VCID-v8ea-efv9-kbc5
11
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-0.20%3Farch=el3
5
url pkg:rpm/redhat/seamonkey@1.0.9-16.3?arch=el4_6
purl pkg:rpm/redhat/seamonkey@1.0.9-16.3?arch=el4_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-fedm-5fp4-euaw
3
vulnerability VCID-fv7q-4y8u-cugf
4
vulnerability VCID-gyt3-v717-w7fc
5
vulnerability VCID-h4db-jdp2-hfb6
6
vulnerability VCID-msn9-shuy-vbbu
7
vulnerability VCID-sank-5xaa-cbha
8
vulnerability VCID-u412-z7y4-tqeq
9
vulnerability VCID-uwgk-ywu3-b7en
10
vulnerability VCID-v8ea-efv9-kbc5
11
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-16.3%3Farch=el4_6
6
url pkg:rpm/redhat/thunderbird@1.5.0.12-14?arch=el4
purl pkg:rpm/redhat/thunderbird@1.5.0.12-14?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-eyd4-5a3z-4qfm
3
vulnerability VCID-fedm-5fp4-euaw
4
vulnerability VCID-fv7q-4y8u-cugf
5
vulnerability VCID-gyt3-v717-w7fc
6
vulnerability VCID-h4db-jdp2-hfb6
7
vulnerability VCID-msn9-shuy-vbbu
8
vulnerability VCID-sank-5xaa-cbha
9
vulnerability VCID-u412-z7y4-tqeq
10
vulnerability VCID-uwgk-ywu3-b7en
11
vulnerability VCID-v8ea-efv9-kbc5
12
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@1.5.0.12-14%3Farch=el4
7
url pkg:rpm/redhat/thunderbird@2.0.0.16-1?arch=el5
purl pkg:rpm/redhat/thunderbird@2.0.0.16-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-eyd4-5a3z-4qfm
3
vulnerability VCID-fedm-5fp4-euaw
4
vulnerability VCID-fv7q-4y8u-cugf
5
vulnerability VCID-gyt3-v717-w7fc
6
vulnerability VCID-h4db-jdp2-hfb6
7
vulnerability VCID-msn9-shuy-vbbu
8
vulnerability VCID-sank-5xaa-cbha
9
vulnerability VCID-u412-z7y4-tqeq
10
vulnerability VCID-uwgk-ywu3-b7en
11
vulnerability VCID-v8ea-efv9-kbc5
12
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@2.0.0.16-1%3Farch=el5
8
url pkg:rpm/redhat/xulrunner@1.9-1?arch=el5
purl pkg:rpm/redhat/xulrunner@1.9-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-fedm-5fp4-euaw
3
vulnerability VCID-fv7q-4y8u-cugf
4
vulnerability VCID-gyt3-v717-w7fc
5
vulnerability VCID-h4db-jdp2-hfb6
6
vulnerability VCID-msn9-shuy-vbbu
7
vulnerability VCID-sank-5xaa-cbha
8
vulnerability VCID-u412-z7y4-tqeq
9
vulnerability VCID-uwgk-ywu3-b7en
10
vulnerability VCID-v8ea-efv9-kbc5
11
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@1.9-1%3Farch=el5
9
url pkg:rpm/redhat/yelp@2.16.0-19?arch=el5
purl pkg:rpm/redhat/yelp@2.16.0-19?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2591-pndu-87et
1
vulnerability VCID-bwu7-pzjb-ryby
2
vulnerability VCID-fedm-5fp4-euaw
3
vulnerability VCID-fv7q-4y8u-cugf
4
vulnerability VCID-gyt3-v717-w7fc
5
vulnerability VCID-h4db-jdp2-hfb6
6
vulnerability VCID-msn9-shuy-vbbu
7
vulnerability VCID-sank-5xaa-cbha
8
vulnerability VCID-u412-z7y4-tqeq
9
vulnerability VCID-uwgk-ywu3-b7en
10
vulnerability VCID-v8ea-efv9-kbc5
11
vulnerability VCID-vh98-ydt4-zbc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/yelp@2.16.0-19%3Farch=el5
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2008-0616.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0616.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2807.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2807
reference_id
reference_type
scores
0
value 0.01628
scoring_system epss
scoring_elements 0.8195
published_at 2026-04-29T12:55:00Z
1
value 0.01628
scoring_system epss
scoring_elements 0.81807
published_at 2026-04-01T12:55:00Z
2
value 0.01628
scoring_system epss
scoring_elements 0.81934
published_at 2026-04-24T12:55:00Z
3
value 0.01628
scoring_system epss
scoring_elements 0.81945
published_at 2026-04-26T12:55:00Z
4
value 0.01628
scoring_system epss
scoring_elements 0.81817
published_at 2026-04-02T12:55:00Z
5
value 0.01628
scoring_system epss
scoring_elements 0.8184
published_at 2026-04-04T12:55:00Z
6
value 0.01628
scoring_system epss
scoring_elements 0.81837
published_at 2026-04-07T12:55:00Z
7
value 0.01628
scoring_system epss
scoring_elements 0.81864
published_at 2026-04-08T12:55:00Z
8
value 0.01628
scoring_system epss
scoring_elements 0.81871
published_at 2026-04-09T12:55:00Z
9
value 0.01628
scoring_system epss
scoring_elements 0.8189
published_at 2026-04-11T12:55:00Z
10
value 0.01628
scoring_system epss
scoring_elements 0.81878
published_at 2026-04-12T12:55:00Z
11
value 0.01628
scoring_system epss
scoring_elements 0.81873
published_at 2026-04-13T12:55:00Z
12
value 0.01628
scoring_system epss
scoring_elements 0.81909
published_at 2026-04-18T12:55:00Z
13
value 0.01628
scoring_system epss
scoring_elements 0.81911
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2807
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=397093
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=397093
5
reference_url http://secunia.com/advisories/30878
reference_id
reference_type
scores
url http://secunia.com/advisories/30878
6
reference_url http://secunia.com/advisories/30898
reference_id
reference_type
scores
url http://secunia.com/advisories/30898
7
reference_url http://secunia.com/advisories/30903
reference_id
reference_type
scores
url http://secunia.com/advisories/30903
8
reference_url http://secunia.com/advisories/30911
reference_id
reference_type
scores
url http://secunia.com/advisories/30911
9
reference_url http://secunia.com/advisories/30949
reference_id
reference_type
scores
url http://secunia.com/advisories/30949
10
reference_url http://secunia.com/advisories/31005
reference_id
reference_type
scores
url http://secunia.com/advisories/31005
11
reference_url http://secunia.com/advisories/31008
reference_id
reference_type
scores
url http://secunia.com/advisories/31008
12
reference_url http://secunia.com/advisories/31021
reference_id
reference_type
scores
url http://secunia.com/advisories/31021
13
reference_url http://secunia.com/advisories/31023
reference_id
reference_type
scores
url http://secunia.com/advisories/31023
14
reference_url http://secunia.com/advisories/31069
reference_id
reference_type
scores
url http://secunia.com/advisories/31069
15
reference_url http://secunia.com/advisories/31076
reference_id
reference_type
scores
url http://secunia.com/advisories/31076
16
reference_url http://secunia.com/advisories/31183
reference_id
reference_type
scores
url http://secunia.com/advisories/31183
17
reference_url http://secunia.com/advisories/31195
reference_id
reference_type
scores
url http://secunia.com/advisories/31195
18
reference_url http://secunia.com/advisories/31220
reference_id
reference_type
scores
url http://secunia.com/advisories/31220
19
reference_url http://secunia.com/advisories/31253
reference_id
reference_type
scores
url http://secunia.com/advisories/31253
20
reference_url http://secunia.com/advisories/31286
reference_id
reference_type
scores
url http://secunia.com/advisories/31286
21
reference_url http://secunia.com/advisories/31377
reference_id
reference_type
scores
url http://secunia.com/advisories/31377
22
reference_url http://secunia.com/advisories/31403
reference_id
reference_type
scores
url http://secunia.com/advisories/31403
23
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
24
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
25
reference_url http://security.gentoo.org/glsa/glsa-200808-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200808-03.xml
26
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/50656
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/50656
27
reference_url https://issues.rpath.com/browse/RPL-2646
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2646
28
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152
29
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911
30
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9432
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9432
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
33
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html
34
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html
35
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html
36
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html
37
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html
38
reference_url http://wiki.rpath.com/Advisories:rPSA-2008-0216
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2008-0216
39
reference_url http://www.debian.org/security/2008/dsa-1607
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1607
40
reference_url http://www.debian.org/security/2008/dsa-1615
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1615
41
reference_url http://www.debian.org/security/2008/dsa-1621
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1621
42
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
43
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:136
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:136
44
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
45
reference_url http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15
reference_id
reference_type
scores
url http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15
46
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-29.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-29.html
47
reference_url http://www.redhat.com/support/errata/RHSA-2008-0547.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0547.html
48
reference_url http://www.redhat.com/support/errata/RHSA-2008-0549.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0549.html
49
reference_url http://www.redhat.com/support/errata/RHSA-2008-0569.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0569.html
50
reference_url http://www.securityfocus.com/archive/1/494080/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/494080/100/0/threaded
51
reference_url http://www.securityfocus.com/bid/30038
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30038
52
reference_url http://www.securitytracker.com/id?1020419
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020419
53
reference_url http://www.ubuntu.com/usn/usn-619-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-619-1
54
reference_url http://www.ubuntu.com/usn/usn-629-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-629-1
55
reference_url http://www.vupen.com/english/advisories/2008/1993/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1993/references
56
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
57
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=452709
reference_id 452709
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=452709
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807
reference_id CVE-2008-2807
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2807
reference_id CVE-2008-2807
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-2807
84
reference_url https://security.gentoo.org/glsa/200808-03
reference_id GLSA-200808-03
reference_type
scores
url https://security.gentoo.org/glsa/200808-03
85
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-29
reference_id mfsa2008-29
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-29
86
reference_url https://access.redhat.com/errata/RHSA-2008:0547
reference_id RHSA-2008:0547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0547
87
reference_url https://access.redhat.com/errata/RHSA-2008:0549
reference_id RHSA-2008:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0549
88
reference_url https://access.redhat.com/errata/RHSA-2008:0569
reference_id RHSA-2008:0569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0569
89
reference_url https://access.redhat.com/errata/RHSA-2008:0616
reference_id RHSA-2008:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0616
90
reference_url https://usn.ubuntu.com/619-1/
reference_id USN-619-1
reference_type
scores
url https://usn.ubuntu.com/619-1/
91
reference_url https://usn.ubuntu.com/629-1/
reference_id USN-629-1
reference_type
scores
url https://usn.ubuntu.com/629-1/
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
1
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
Severity_range_score0.1 - 5.0
Exploitability0.5
Weighted_severity4.5
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-vh98-ydt4-zbc6