Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-gxpg-1hxr-uuam
SummaryThe child frames in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 inherit the default charset from the parent window, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.
Aliases
0
alias CVE-2007-0996
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/devhelp@0.10-0.7?arch=el4
purl pkg:rpm/redhat/devhelp@0.10-0.7?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-8tfu-9gxc-x7gb
3
vulnerability VCID-9yms-2e8t-sfa5
4
vulnerability VCID-ar1e-t65c-4yax
5
vulnerability VCID-ctu2-ur5f-xyhx
6
vulnerability VCID-ctyb-btzs-kubf
7
vulnerability VCID-dzxs-qh6q-nkfc
8
vulnerability VCID-gxpg-1hxr-uuam
9
vulnerability VCID-khgu-a7t9-rbdc
10
vulnerability VCID-p5pk-vdvp-q7ar
11
vulnerability VCID-qxqf-6kdy-nyap
12
vulnerability VCID-ybtw-bsv6-qbdx
13
vulnerability VCID-z276-uc3n-8fhx
14
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/devhelp@0.10-0.7%3Farch=el4
1
url pkg:rpm/redhat/devhelp@0.12-10.0.1?arch=el5
purl pkg:rpm/redhat/devhelp@0.12-10.0.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-9yms-2e8t-sfa5
3
vulnerability VCID-ar1e-t65c-4yax
4
vulnerability VCID-ctu2-ur5f-xyhx
5
vulnerability VCID-ctyb-btzs-kubf
6
vulnerability VCID-gxpg-1hxr-uuam
7
vulnerability VCID-khgu-a7t9-rbdc
8
vulnerability VCID-p5pk-vdvp-q7ar
9
vulnerability VCID-qxqf-6kdy-nyap
10
vulnerability VCID-ybtw-bsv6-qbdx
11
vulnerability VCID-z276-uc3n-8fhx
12
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/devhelp@0.12-10.0.1%3Farch=el5
2
url pkg:rpm/redhat/firefox@1.5.0.10-0.1?arch=el4
purl pkg:rpm/redhat/firefox@1.5.0.10-0.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-9yms-2e8t-sfa5
3
vulnerability VCID-ar1e-t65c-4yax
4
vulnerability VCID-ctu2-ur5f-xyhx
5
vulnerability VCID-ctyb-btzs-kubf
6
vulnerability VCID-dzxs-qh6q-nkfc
7
vulnerability VCID-gxpg-1hxr-uuam
8
vulnerability VCID-khgu-a7t9-rbdc
9
vulnerability VCID-p5pk-vdvp-q7ar
10
vulnerability VCID-qxqf-6kdy-nyap
11
vulnerability VCID-ybtw-bsv6-qbdx
12
vulnerability VCID-z276-uc3n-8fhx
13
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@1.5.0.10-0.1%3Farch=el4
3
url pkg:rpm/redhat/firefox@1.5.0.10-2?arch=el5
purl pkg:rpm/redhat/firefox@1.5.0.10-2?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-9yms-2e8t-sfa5
3
vulnerability VCID-ar1e-t65c-4yax
4
vulnerability VCID-ctu2-ur5f-xyhx
5
vulnerability VCID-ctyb-btzs-kubf
6
vulnerability VCID-gxpg-1hxr-uuam
7
vulnerability VCID-khgu-a7t9-rbdc
8
vulnerability VCID-p5pk-vdvp-q7ar
9
vulnerability VCID-qxqf-6kdy-nyap
10
vulnerability VCID-ybtw-bsv6-qbdx
11
vulnerability VCID-z276-uc3n-8fhx
12
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@1.5.0.10-2%3Farch=el5
4
url pkg:rpm/redhat/seamonkey@1.0.8-0.2?arch=el3
purl pkg:rpm/redhat/seamonkey@1.0.8-0.2?arch=el3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-8tfu-9gxc-x7gb
3
vulnerability VCID-9yms-2e8t-sfa5
4
vulnerability VCID-ar1e-t65c-4yax
5
vulnerability VCID-ctu2-ur5f-xyhx
6
vulnerability VCID-ctyb-btzs-kubf
7
vulnerability VCID-dzxs-qh6q-nkfc
8
vulnerability VCID-gxpg-1hxr-uuam
9
vulnerability VCID-khgu-a7t9-rbdc
10
vulnerability VCID-p5pk-vdvp-q7ar
11
vulnerability VCID-qxqf-6kdy-nyap
12
vulnerability VCID-ybtw-bsv6-qbdx
13
vulnerability VCID-z276-uc3n-8fhx
14
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.8-0.2%3Farch=el3
5
url pkg:rpm/redhat/seamonkey@1.0.8-0.2?arch=el4
purl pkg:rpm/redhat/seamonkey@1.0.8-0.2?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-8tfu-9gxc-x7gb
3
vulnerability VCID-9yms-2e8t-sfa5
4
vulnerability VCID-ar1e-t65c-4yax
5
vulnerability VCID-ctu2-ur5f-xyhx
6
vulnerability VCID-ctyb-btzs-kubf
7
vulnerability VCID-dzxs-qh6q-nkfc
8
vulnerability VCID-gxpg-1hxr-uuam
9
vulnerability VCID-khgu-a7t9-rbdc
10
vulnerability VCID-p5pk-vdvp-q7ar
11
vulnerability VCID-qxqf-6kdy-nyap
12
vulnerability VCID-ybtw-bsv6-qbdx
13
vulnerability VCID-z276-uc3n-8fhx
14
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.8-0.2%3Farch=el4
6
url pkg:rpm/redhat/seamonkey@1.0.8-0.2?arch=el2
purl pkg:rpm/redhat/seamonkey@1.0.8-0.2?arch=el2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-8tfu-9gxc-x7gb
3
vulnerability VCID-9yms-2e8t-sfa5
4
vulnerability VCID-ar1e-t65c-4yax
5
vulnerability VCID-ctu2-ur5f-xyhx
6
vulnerability VCID-ctyb-btzs-kubf
7
vulnerability VCID-dzxs-qh6q-nkfc
8
vulnerability VCID-gxpg-1hxr-uuam
9
vulnerability VCID-khgu-a7t9-rbdc
10
vulnerability VCID-p5pk-vdvp-q7ar
11
vulnerability VCID-qxqf-6kdy-nyap
12
vulnerability VCID-ybtw-bsv6-qbdx
13
vulnerability VCID-z276-uc3n-8fhx
14
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.8-0.2%3Farch=el2
7
url pkg:rpm/redhat/thunderbird@1.5.0.10-0.1?arch=el4
purl pkg:rpm/redhat/thunderbird@1.5.0.10-0.1?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-8tfu-9gxc-x7gb
3
vulnerability VCID-9yms-2e8t-sfa5
4
vulnerability VCID-ctu2-ur5f-xyhx
5
vulnerability VCID-ctyb-btzs-kubf
6
vulnerability VCID-dzxs-qh6q-nkfc
7
vulnerability VCID-gxpg-1hxr-uuam
8
vulnerability VCID-khgu-a7t9-rbdc
9
vulnerability VCID-p5pk-vdvp-q7ar
10
vulnerability VCID-qxqf-6kdy-nyap
11
vulnerability VCID-ybtw-bsv6-qbdx
12
vulnerability VCID-z276-uc3n-8fhx
13
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@1.5.0.10-0.1%3Farch=el4
8
url pkg:rpm/redhat/thunderbird@1.5.0.10-1?arch=el5
purl pkg:rpm/redhat/thunderbird@1.5.0.10-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-8tfu-9gxc-x7gb
3
vulnerability VCID-9yms-2e8t-sfa5
4
vulnerability VCID-ctu2-ur5f-xyhx
5
vulnerability VCID-ctyb-btzs-kubf
6
vulnerability VCID-gxpg-1hxr-uuam
7
vulnerability VCID-khgu-a7t9-rbdc
8
vulnerability VCID-p5pk-vdvp-q7ar
9
vulnerability VCID-qxqf-6kdy-nyap
10
vulnerability VCID-ybtw-bsv6-qbdx
11
vulnerability VCID-z276-uc3n-8fhx
12
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@1.5.0.10-1%3Farch=el5
9
url pkg:rpm/redhat/yelp@2.16.0-14.0.1?arch=el5
purl pkg:rpm/redhat/yelp@2.16.0-14.0.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h1w-mvpk-c7h8
1
vulnerability VCID-7dmk-4zh8-hfbf
2
vulnerability VCID-9yms-2e8t-sfa5
3
vulnerability VCID-ar1e-t65c-4yax
4
vulnerability VCID-ctu2-ur5f-xyhx
5
vulnerability VCID-ctyb-btzs-kubf
6
vulnerability VCID-gxpg-1hxr-uuam
7
vulnerability VCID-khgu-a7t9-rbdc
8
vulnerability VCID-p5pk-vdvp-q7ar
9
vulnerability VCID-qxqf-6kdy-nyap
10
vulnerability VCID-ybtw-bsv6-qbdx
11
vulnerability VCID-z276-uc3n-8fhx
12
vulnerability VCID-zthy-y4qb-eyes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/yelp@2.16.0-14.0.1%3Farch=el5
References
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
2
reference_url http://fedoranews.org/cms/node/2713
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2713
3
reference_url http://fedoranews.org/cms/node/2728
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2728
4
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
5
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
6
reference_url http://osvdb.org/33812
reference_id
reference_type
scores
url http://osvdb.org/33812
7
reference_url http://rhn.redhat.com/errata/RHSA-2007-0077.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0077.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0996.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0996.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0996
reference_id
reference_type
scores
0
value 0.02609
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-26T12:55:00Z
1
value 0.02609
scoring_system epss
scoring_elements 0.85664
published_at 2026-04-18T12:55:00Z
2
value 0.02609
scoring_system epss
scoring_elements 0.85681
published_at 2026-04-24T12:55:00Z
3
value 0.02609
scoring_system epss
scoring_elements 0.85563
published_at 2026-04-01T12:55:00Z
4
value 0.02609
scoring_system epss
scoring_elements 0.85576
published_at 2026-04-02T12:55:00Z
5
value 0.02609
scoring_system epss
scoring_elements 0.85593
published_at 2026-04-04T12:55:00Z
6
value 0.02609
scoring_system epss
scoring_elements 0.85599
published_at 2026-04-07T12:55:00Z
7
value 0.02609
scoring_system epss
scoring_elements 0.85619
published_at 2026-04-08T12:55:00Z
8
value 0.02609
scoring_system epss
scoring_elements 0.8563
published_at 2026-04-09T12:55:00Z
9
value 0.02609
scoring_system epss
scoring_elements 0.85643
published_at 2026-04-11T12:55:00Z
10
value 0.02609
scoring_system epss
scoring_elements 0.8564
published_at 2026-04-12T12:55:00Z
11
value 0.02609
scoring_system epss
scoring_elements 0.85636
published_at 2026-04-13T12:55:00Z
12
value 0.02609
scoring_system epss
scoring_elements 0.85659
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0996
10
reference_url http://secunia.com/advisories/24205
reference_id
reference_type
scores
url http://secunia.com/advisories/24205
11
reference_url http://secunia.com/advisories/24287
reference_id
reference_type
scores
url http://secunia.com/advisories/24287
12
reference_url http://secunia.com/advisories/24290
reference_id
reference_type
scores
url http://secunia.com/advisories/24290
13
reference_url http://secunia.com/advisories/24320
reference_id
reference_type
scores
url http://secunia.com/advisories/24320
14
reference_url http://secunia.com/advisories/24328
reference_id
reference_type
scores
url http://secunia.com/advisories/24328
15
reference_url http://secunia.com/advisories/24333
reference_id
reference_type
scores
url http://secunia.com/advisories/24333
16
reference_url http://secunia.com/advisories/24342
reference_id
reference_type
scores
url http://secunia.com/advisories/24342
17
reference_url http://secunia.com/advisories/24343
reference_id
reference_type
scores
url http://secunia.com/advisories/24343
18
reference_url http://secunia.com/advisories/24384
reference_id
reference_type
scores
url http://secunia.com/advisories/24384
19
reference_url http://secunia.com/advisories/24395
reference_id
reference_type
scores
url http://secunia.com/advisories/24395
20
reference_url http://secunia.com/advisories/24455
reference_id
reference_type
scores
url http://secunia.com/advisories/24455
21
reference_url http://secunia.com/advisories/24457
reference_id
reference_type
scores
url http://secunia.com/advisories/24457
22
reference_url http://secunia.com/advisories/24650
reference_id
reference_type
scores
url http://secunia.com/advisories/24650
23
reference_url http://secunia.com/advisories/25588
reference_id
reference_type
scores
url http://secunia.com/advisories/25588
24
reference_url https://issues.rpath.com/browse/RPL-1103
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1103
25
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
26
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10086
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10086
28
reference_url http://www.debian.org/security/2007/dsa-1336
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1336
29
reference_url http://www.hardened-php.net/advisory_032007.142.html
reference_id
reference_type
scores
url http://www.hardened-php.net/advisory_032007.142.html
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
31
reference_url http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
32
reference_url http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2007-0078.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0078.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2007-0079.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0079.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2007-0097.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0097.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2007-0108.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0108.html
37
reference_url http://www.securityfocus.com/archive/1/461076/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/461076/100/0/threaded
38
reference_url http://www.securityfocus.com/archive/1/461336/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/461336/100/0/threaded
39
reference_url http://www.securityfocus.com/bid/22694
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22694
40
reference_url http://www.securitytracker.com/id?1017702
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017702
41
reference_url http://www.ubuntu.com/usn/usn-428-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-428-1
42
reference_url http://www.vupen.com/english/advisories/2007/0718
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0718
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618288
reference_id 1618288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618288
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0996
reference_id CVE-2007-0996
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0996
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0996
reference_id CVE-2007-0996
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-0996
74
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2007-02
reference_id mfsa2007-02
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2007-02
75
reference_url https://access.redhat.com/errata/RHSA-2007:0077
reference_id RHSA-2007:0077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0077
76
reference_url https://access.redhat.com/errata/RHSA-2007:0078
reference_id RHSA-2007:0078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0078
77
reference_url https://access.redhat.com/errata/RHSA-2007:0079
reference_id RHSA-2007:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0079
78
reference_url https://access.redhat.com/errata/RHSA-2007:0097
reference_id RHSA-2007:0097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0097
79
reference_url https://access.redhat.com/errata/RHSA-2007:0108
reference_id RHSA-2007:0108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0108
80
reference_url https://usn.ubuntu.com/428-1/
reference_id USN-428-1
reference_type
scores
url https://usn.ubuntu.com/428-1/
Weaknesses
Exploits
Severity_range_score0.1 - 5.8
Exploitability0.5
Weighted_severity5.2
Risk_score2.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-gxpg-1hxr-uuam