Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-s6se-wudc-b7cq
Summary
Multiple vulnerabilities have been reported in Mozilla Firefox,
    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted
    arbitrary remote code execution.
Aliases
0
alias CVE-2007-2868
Fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@2.0.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@2.0.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@2.0.0.4
1
url pkg:ebuild/mail-client/mozilla-thunderbird-bin@2.0.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird-bin@2.0.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird-bin@2.0.0.4
2
url pkg:ebuild/net-libs/xulrunner@1.1.2
purl pkg:ebuild/net-libs/xulrunner@1.1.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.1.2
3
url pkg:ebuild/net-libs/xulrunner@1.8.1.4
purl pkg:ebuild/net-libs/xulrunner@1.8.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@1.8.1.4
4
url pkg:ebuild/net-libs/xulrunner@2.0.0.4
purl pkg:ebuild/net-libs/xulrunner@2.0.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/xulrunner@2.0.0.4
5
url pkg:ebuild/www-client/mozilla-firefox@2.0.0.4
purl pkg:ebuild/www-client/mozilla-firefox@2.0.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/mozilla-firefox@2.0.0.4
6
url pkg:ebuild/www-client/mozilla-firefox-bin@2.0.0.4
purl pkg:ebuild/www-client/mozilla-firefox-bin@2.0.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/mozilla-firefox-bin@2.0.0.4
7
url pkg:ebuild/www-client/seamonkey@1.1.2
purl pkg:ebuild/www-client/seamonkey@1.1.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.2
8
url pkg:ebuild/www-client/seamonkey@2.0.0.4
purl pkg:ebuild/www-client/seamonkey@2.0.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.4
9
url pkg:ebuild/www-client/seamonkey-bin@1.1.2
purl pkg:ebuild/www-client/seamonkey-bin@1.1.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.2
10
url pkg:ebuild/www-client/seamonkey-bin@2.0.0.4
purl pkg:ebuild/www-client/seamonkey-bin@2.0.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@2.0.0.4
Affected_packages
0
url pkg:rpm/redhat/devhelp@0.10-0.8?arch=el4
purl pkg:rpm/redhat/devhelp@0.10-0.8?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-71rr-cgx8-dqby
2
vulnerability VCID-d8y5-krh8-4fcc
3
vulnerability VCID-e71c-pdgk-gqc5
4
vulnerability VCID-s6se-wudc-b7cq
5
vulnerability VCID-ukjn-pbdj-u3e3
6
vulnerability VCID-umwf-kzwt-5yeu
7
vulnerability VCID-vw5j-qjxa-m3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/devhelp@0.10-0.8%3Farch=el4
1
url pkg:rpm/redhat/devhelp@0.12-11?arch=el5
purl pkg:rpm/redhat/devhelp@0.12-11?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-71rr-cgx8-dqby
2
vulnerability VCID-d8y5-krh8-4fcc
3
vulnerability VCID-e71c-pdgk-gqc5
4
vulnerability VCID-s6se-wudc-b7cq
5
vulnerability VCID-umwf-kzwt-5yeu
6
vulnerability VCID-vw5j-qjxa-m3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/devhelp@0.12-11%3Farch=el5
2
url pkg:rpm/redhat/firefox@1.5.0.12-0.1?arch=el4
purl pkg:rpm/redhat/firefox@1.5.0.12-0.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-71rr-cgx8-dqby
2
vulnerability VCID-d8y5-krh8-4fcc
3
vulnerability VCID-e71c-pdgk-gqc5
4
vulnerability VCID-s6se-wudc-b7cq
5
vulnerability VCID-umwf-kzwt-5yeu
6
vulnerability VCID-vw5j-qjxa-m3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@1.5.0.12-0.1%3Farch=el4
3
url pkg:rpm/redhat/firefox@1.5.0.12-1?arch=el5
purl pkg:rpm/redhat/firefox@1.5.0.12-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-71rr-cgx8-dqby
2
vulnerability VCID-d8y5-krh8-4fcc
3
vulnerability VCID-e71c-pdgk-gqc5
4
vulnerability VCID-s6se-wudc-b7cq
5
vulnerability VCID-umwf-kzwt-5yeu
6
vulnerability VCID-vw5j-qjxa-m3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@1.5.0.12-1%3Farch=el5
4
url pkg:rpm/redhat/seamonkey@1.0.9-0.1?arch=el2
purl pkg:rpm/redhat/seamonkey@1.0.9-0.1?arch=el2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-71rr-cgx8-dqby
2
vulnerability VCID-d8y5-krh8-4fcc
3
vulnerability VCID-e71c-pdgk-gqc5
4
vulnerability VCID-s6se-wudc-b7cq
5
vulnerability VCID-ukjn-pbdj-u3e3
6
vulnerability VCID-umwf-kzwt-5yeu
7
vulnerability VCID-vw5j-qjxa-m3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-0.1%3Farch=el2
5
url pkg:rpm/redhat/seamonkey@1.0.9-0.1?arch=el3
purl pkg:rpm/redhat/seamonkey@1.0.9-0.1?arch=el3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-71rr-cgx8-dqby
2
vulnerability VCID-d8y5-krh8-4fcc
3
vulnerability VCID-e71c-pdgk-gqc5
4
vulnerability VCID-s6se-wudc-b7cq
5
vulnerability VCID-ukjn-pbdj-u3e3
6
vulnerability VCID-umwf-kzwt-5yeu
7
vulnerability VCID-vw5j-qjxa-m3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-0.1%3Farch=el3
6
url pkg:rpm/redhat/seamonkey@1.0.9-2?arch=el4
purl pkg:rpm/redhat/seamonkey@1.0.9-2?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-71rr-cgx8-dqby
2
vulnerability VCID-d8y5-krh8-4fcc
3
vulnerability VCID-e71c-pdgk-gqc5
4
vulnerability VCID-s6se-wudc-b7cq
5
vulnerability VCID-ukjn-pbdj-u3e3
6
vulnerability VCID-umwf-kzwt-5yeu
7
vulnerability VCID-vw5j-qjxa-m3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-2%3Farch=el4
7
url pkg:rpm/redhat/thunderbird@1.5.0.12-0.1?arch=el4
purl pkg:rpm/redhat/thunderbird@1.5.0.12-0.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-d8y5-krh8-4fcc
2
vulnerability VCID-e71c-pdgk-gqc5
3
vulnerability VCID-s6se-wudc-b7cq
4
vulnerability VCID-ukjn-pbdj-u3e3
5
vulnerability VCID-umwf-kzwt-5yeu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@1.5.0.12-0.1%3Farch=el4
8
url pkg:rpm/redhat/thunderbird@1.5.0.12-1?arch=el5
purl pkg:rpm/redhat/thunderbird@1.5.0.12-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-d8y5-krh8-4fcc
2
vulnerability VCID-e71c-pdgk-gqc5
3
vulnerability VCID-s6se-wudc-b7cq
4
vulnerability VCID-ukjn-pbdj-u3e3
5
vulnerability VCID-umwf-kzwt-5yeu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@1.5.0.12-1%3Farch=el5
9
url pkg:rpm/redhat/yelp@2.16.0-15?arch=el5
purl pkg:rpm/redhat/yelp@2.16.0-15?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a2n-1f1f-ruft
1
vulnerability VCID-71rr-cgx8-dqby
2
vulnerability VCID-d8y5-krh8-4fcc
3
vulnerability VCID-e71c-pdgk-gqc5
4
vulnerability VCID-s6se-wudc-b7cq
5
vulnerability VCID-umwf-kzwt-5yeu
6
vulnerability VCID-vw5j-qjxa-m3fn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/yelp@2.16.0-15%3Farch=el5
References
0
reference_url http://fedoranews.org/cms/node/2747
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2747
1
reference_url http://fedoranews.org/cms/node/2749
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2749
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
4
reference_url http://osvdb.org/35138
reference_id
reference_type
scores
url http://osvdb.org/35138
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2868.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2868.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2868
reference_id
reference_type
scores
0
value 0.27663
scoring_system epss
scoring_elements 0.96453
published_at 2026-04-24T12:55:00Z
1
value 0.27663
scoring_system epss
scoring_elements 0.96405
published_at 2026-04-01T12:55:00Z
2
value 0.27663
scoring_system epss
scoring_elements 0.9645
published_at 2026-04-18T12:55:00Z
3
value 0.27663
scoring_system epss
scoring_elements 0.96452
published_at 2026-04-21T12:55:00Z
4
value 0.27663
scoring_system epss
scoring_elements 0.96412
published_at 2026-04-02T12:55:00Z
5
value 0.27663
scoring_system epss
scoring_elements 0.96416
published_at 2026-04-04T12:55:00Z
6
value 0.27663
scoring_system epss
scoring_elements 0.9642
published_at 2026-04-07T12:55:00Z
7
value 0.27663
scoring_system epss
scoring_elements 0.96428
published_at 2026-04-08T12:55:00Z
8
value 0.27663
scoring_system epss
scoring_elements 0.96432
published_at 2026-04-09T12:55:00Z
9
value 0.27663
scoring_system epss
scoring_elements 0.96436
published_at 2026-04-12T12:55:00Z
10
value 0.27663
scoring_system epss
scoring_elements 0.96439
published_at 2026-04-13T12:55:00Z
11
value 0.27663
scoring_system epss
scoring_elements 0.96446
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2868
7
reference_url http://secunia.com/advisories/24406
reference_id
reference_type
scores
url http://secunia.com/advisories/24406
8
reference_url http://secunia.com/advisories/24456
reference_id
reference_type
scores
url http://secunia.com/advisories/24456
9
reference_url http://secunia.com/advisories/25469
reference_id
reference_type
scores
url http://secunia.com/advisories/25469
10
reference_url http://secunia.com/advisories/25476
reference_id
reference_type
scores
url http://secunia.com/advisories/25476
11
reference_url http://secunia.com/advisories/25488
reference_id
reference_type
scores
url http://secunia.com/advisories/25488
12
reference_url http://secunia.com/advisories/25489
reference_id
reference_type
scores
url http://secunia.com/advisories/25489
13
reference_url http://secunia.com/advisories/25490
reference_id
reference_type
scores
url http://secunia.com/advisories/25490
14
reference_url http://secunia.com/advisories/25491
reference_id
reference_type
scores
url http://secunia.com/advisories/25491
15
reference_url http://secunia.com/advisories/25492
reference_id
reference_type
scores
url http://secunia.com/advisories/25492
16
reference_url http://secunia.com/advisories/25496
reference_id
reference_type
scores
url http://secunia.com/advisories/25496
17
reference_url http://secunia.com/advisories/25533
reference_id
reference_type
scores
url http://secunia.com/advisories/25533
18
reference_url http://secunia.com/advisories/25534
reference_id
reference_type
scores
url http://secunia.com/advisories/25534
19
reference_url http://secunia.com/advisories/25559
reference_id
reference_type
scores
url http://secunia.com/advisories/25559
20
reference_url http://secunia.com/advisories/25635
reference_id
reference_type
scores
url http://secunia.com/advisories/25635
21
reference_url http://secunia.com/advisories/25644
reference_id
reference_type
scores
url http://secunia.com/advisories/25644
22
reference_url http://secunia.com/advisories/25647
reference_id
reference_type
scores
url http://secunia.com/advisories/25647
23
reference_url http://secunia.com/advisories/25664
reference_id
reference_type
scores
url http://secunia.com/advisories/25664
24
reference_url http://secunia.com/advisories/25685
reference_id
reference_type
scores
url http://secunia.com/advisories/25685
25
reference_url http://secunia.com/advisories/25750
reference_id
reference_type
scores
url http://secunia.com/advisories/25750
26
reference_url http://secunia.com/advisories/25858
reference_id
reference_type
scores
url http://secunia.com/advisories/25858
27
reference_url http://secunia.com/advisories/27427
reference_id
reference_type
scores
url http://secunia.com/advisories/27427
28
reference_url http://secunia.com/advisories/28363
reference_id
reference_type
scores
url http://secunia.com/advisories/28363
29
reference_url http://security.gentoo.org/glsa/glsa-200706-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200706-06.xml
30
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34605
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34605
31
reference_url https://issues.rpath.com/browse/RPL-1424
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1424
32
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947
33
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857
34
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10711
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10711
35
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103125-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103125-1
36
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-201505-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-201505-1
37
reference_url http://www.debian.org/security/2007/dsa-1300
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1300
38
reference_url http://www.debian.org/security/2007/dsa-1305
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1305
39
reference_url http://www.debian.org/security/2007/dsa-1306
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1306
40
reference_url http://www.debian.org/security/2007/dsa-1308
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1308
41
reference_url http://www.kb.cert.org/vuls/id/609956
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/609956
42
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:119
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:119
43
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:120
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:120
44
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:131
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:131
45
reference_url http://www.mozilla.org/security/announce/2007/mfsa2007-12.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2007/mfsa2007-12.html
46
reference_url http://www.novell.com/linux/security/advisories/2007_36_mozilla.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_36_mozilla.html
47
reference_url http://www.redhat.com/support/errata/RHSA-2007-0400.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0400.html
48
reference_url http://www.redhat.com/support/errata/RHSA-2007-0401.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0401.html
49
reference_url http://www.redhat.com/support/errata/RHSA-2007-0402.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0402.html
50
reference_url http://www.securityfocus.com/archive/1/470172/100/200/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/470172/100/200/threaded
51
reference_url http://www.securityfocus.com/archive/1/471842/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471842/100/0/threaded
52
reference_url http://www.securityfocus.com/bid/24242
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24242
53
reference_url http://www.securitytracker.com/id?1018151
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018151
54
reference_url http://www.securitytracker.com/id?1018152
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018152
55
reference_url http://www.securitytracker.com/id?1018153
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018153
56
reference_url http://www.ubuntu.com/usn/usn-468-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-468-1
57
reference_url http://www.ubuntu.com/usn/usn-469-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-469-1
58
reference_url http://www.us-cert.gov/cas/techalerts/TA07-151A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-151A.html
59
reference_url http://www.vupen.com/english/advisories/2007/1994
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1994
60
reference_url http://www.vupen.com/english/advisories/2007/3632
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3632
61
reference_url http://www.vupen.com/english/advisories/2008/0082
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0082
62
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618369
reference_id 1618369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618369
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868
reference_id CVE-2007-2868
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868
97
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2868
reference_id CVE-2007-2868
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2868
98
reference_url https://security.gentoo.org/glsa/200706-06
reference_id GLSA-200706-06
reference_type
scores
url https://security.gentoo.org/glsa/200706-06
99
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2007-12
reference_id mfsa2007-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2007-12
100
reference_url https://access.redhat.com/errata/RHSA-2007:0400
reference_id RHSA-2007:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0400
101
reference_url https://access.redhat.com/errata/RHSA-2007:0401
reference_id RHSA-2007:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0401
102
reference_url https://access.redhat.com/errata/RHSA-2007:0402
reference_id RHSA-2007:0402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0402
103
reference_url https://usn.ubuntu.com/468-1/
reference_id USN-468-1
reference_type
scores
url https://usn.ubuntu.com/468-1/
104
reference_url https://usn.ubuntu.com/469-1/
reference_id USN-469-1
reference_type
scores
url https://usn.ubuntu.com/469-1/
Weaknesses
0
cwe_id 94
name Improper Control of Generation of Code ('Code Injection')
description The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Exploits
Severity_range_score9.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-s6se-wudc-b7cq