{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","type":"ebuild","namespace":"www-client","name":"seamonkey-bin","version":"1.1.1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.1.2","latest_non_vulnerable_version":"31.5.3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56477?format=json","vulnerability_id":"VCID-5h1w-mvpk-c7h8","summary":"Multiple vulnerabilities have been reported in Mozilla Thunderbird, some of\n    which may allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://fedoranews.org/cms/node/2747","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2747"},{"reference_url":"http://fedoranews.org/cms/node/2749","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2749"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0775.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0775","reference_id":"","reference_type":"","scores":[{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.9567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95613","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.9564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21003","scoring_system":"epss","scoring_elements":"0.95653","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0775"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24252","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24252"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24389"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24406","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24406"},{"reference_url":"http://secunia.com/advisories/24410","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24410"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24455","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24455"},{"reference_url":"http://secunia.com/advisories/24456","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24456"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24522","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24522"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://secunia.com/advisories/25588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25588"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-18.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-18.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32704","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32704"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10012","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10012"},{"reference_url":"http://www.debian.org/security/2007/dsa-1336","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1336"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.kb.cert.org/vuls/id/761756","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/761756"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:052","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:052"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-01.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-01.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.osvdb.org/32114","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32114"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.securitytracker.com/id?1017698","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017698"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-431-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-431-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0719","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0719"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618273","reference_id":"1618273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618273"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775","reference_id":"CVE-2007-0775","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0775","reference_id":"CVE-2007-0775","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0775"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://security.gentoo.org/glsa/200703-18","reference_id":"GLSA-200703-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-01","reference_id":"mfsa2007-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"},{"reference_url":"https://usn.ubuntu.com/431-1/","reference_id":"USN-431-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/431-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0775"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5h1w-mvpk-c7h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56479?format=json","vulnerability_id":"VCID-7dmk-4zh8-hfbf","summary":"Multiple vulnerabilities have been reported in Mozilla Thunderbird, some of\n    which may allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://fedoranews.org/cms/node/2747","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2747"},{"reference_url":"http://fedoranews.org/cms/node/2749","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2749"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0777.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0777","reference_id":"","reference_type":"","scores":[{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97493","published_at":"2026-05-05T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97451","published_at":"2026-04-01T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97468","published_at":"2026-04-08T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.9747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97473","published_at":"2026-04-11T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97484","published_at":"2026-04-16T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97486","published_at":"2026-04-21T12:55:00Z"},{"value":"0.42764","scoring_system":"epss","scoring_elements":"0.97485","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0777"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24252","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24252"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24389"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24406","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24406"},{"reference_url":"http://secunia.com/advisories/24410","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24410"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24455","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24455"},{"reference_url":"http://secunia.com/advisories/24456","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24456"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24522","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24522"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-18.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-18.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32699","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32699"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11331","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11331"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.kb.cert.org/vuls/id/269484","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/269484"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:052","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:052"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-01.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-01.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.osvdb.org/32115","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32115"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.securitytracker.com/id?1017698","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017698"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-431-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-431-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0719","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0719"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618275","reference_id":"1618275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618275"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777","reference_id":"CVE-2007-0777","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0777","reference_id":"CVE-2007-0777","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0777"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://security.gentoo.org/glsa/200703-18","reference_id":"GLSA-200703-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-01","reference_id":"mfsa2007-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"},{"reference_url":"https://usn.ubuntu.com/431-1/","reference_id":"USN-431-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/431-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0777"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7dmk-4zh8-hfbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56478?format=json","vulnerability_id":"VCID-9xy2-u81s-vyfa","summary":"Multiple vulnerabilities have been reported in Mozilla Thunderbird, some of\n    which may allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://fedoranews.org/cms/node/2747","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2747"},{"reference_url":"http://fedoranews.org/cms/node/2749","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2749"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0776","reference_id":"","reference_type":"","scores":[{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96765","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96708","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96753","published_at":"2026-04-26T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.9672","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96737","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.9674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96746","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.9675","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30966","scoring_system":"epss","scoring_elements":"0.96752","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0776"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=360645","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=360645"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24252","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24252"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24389"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24406","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24406"},{"reference_url":"http://secunia.com/advisories/24410","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24410"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24455","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24455"},{"reference_url":"http://secunia.com/advisories/24456","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24456"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24522","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24522"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-18.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-18.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32698","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32698"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.kb.cert.org/vuls/id/551436","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/551436"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:052","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:052"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-01.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-01.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.osvdb.org/32113","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32113"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.securitytracker.com/id?1017698","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017698"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-431-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-431-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0719","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0719"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776","reference_id":"CVE-2007-0776","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0776","reference_id":"CVE-2007-0776","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0776"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://security.gentoo.org/glsa/200703-18","reference_id":"GLSA-200703-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-18"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-01","reference_id":"mfsa2007-01","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-01"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"},{"reference_url":"https://usn.ubuntu.com/431-1/","reference_id":"USN-431-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/431-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0776"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9xy2-u81s-vyfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59560?format=json","vulnerability_id":"VCID-9yms-2e8t-sfa5","summary":"Multiple vulnerabilities have been reported in SeaMonkey, some of which may\n    allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0780.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0780","reference_id":"","reference_type":"","scores":[{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84627","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84476","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84537","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84543","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84552","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84572","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02238","scoring_system":"epss","scoring_elements":"0.84601","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0780"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=354973","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=354973"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24455","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24455"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32667","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32667"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9884","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9884"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-05.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-05.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.osvdb.org/32107","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32107"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.securitytracker.com/id?1017702","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017702"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618278","reference_id":"1618278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618278"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780","reference_id":"CVE-2007-0780","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0780","reference_id":"CVE-2007-0780","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0780"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-05","reference_id":"mfsa2007-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0780"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yms-2e8t-sfa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59555?format=json","vulnerability_id":"VCID-ctu2-ur5f-xyhx","summary":"Multiple vulnerabilities have been reported in SeaMonkey, some of which may\n    allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6077","reference_id":"","reference_type":"","scores":[{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86741","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86646","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86703","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86714","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86707","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86721","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03057","scoring_system":"epss","scoring_elements":"0.86724","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6077"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=360493","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=360493"},{"reference_url":"http://secunia.com/advisories/23046","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23046"},{"reference_url":"http://secunia.com/advisories/23108","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23108"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://secunia.com/advisories/25588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25588"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"http://securitytracker.com/id?1017271","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017271"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30470","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30470"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10031","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10031"},{"reference_url":"http://www.debian.org/security/2007/dsa-1336","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1336"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.info-svc.com/news/11-21-2006/","reference_id":"","reference_type":"","scores":[],"url":"http://www.info-svc.com/news/11-21-2006/"},{"reference_url":"http://www.info-svc.com/news/11-21-2006/rcsr1/","reference_id":"","reference_type":"","scores":[],"url":"http://www.info-svc.com/news/11-21-2006/rcsr1/"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-02.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-02.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/452382/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/452382/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/452431/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/452431/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/452440/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/452440/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/452463/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/452463/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/454982/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/454982/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/455073/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/455073/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/455148/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/455148/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/21240","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21240"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.vupen.com/english/advisories/2006/4662","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/4662"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618236","reference_id":"1618236","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618236"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netscape:navigator:8.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netscape:navigator:8.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netscape:navigator:8.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077","reference_id":"CVE-2006-6077","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6077","reference_id":"CVE-2006-6077","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6077"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-02","reference_id":"mfsa2007-02","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2006-6077"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctu2-ur5f-xyhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59558?format=json","vulnerability_id":"VCID-ctyb-btzs-kubf","summary":"Multiple vulnerabilities have been reported in SeaMonkey, some of which may\n    allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://osvdb.org/32109","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/32109"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0779.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0779","reference_id":"","reference_type":"","scores":[{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88576","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88639","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88632","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04122","scoring_system":"epss","scoring_elements":"0.88656","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0779"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=361298","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=361298"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24455","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24455"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8757","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8757"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-04.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-04.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.securitytracker.com/id?1017700","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017700"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618277","reference_id":"1618277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618277"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779","reference_id":"CVE-2007-0779","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0779","reference_id":"CVE-2007-0779","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0779"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-04","reference_id":"mfsa2007-04","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0779"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctyb-btzs-kubf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59563?format=json","vulnerability_id":"VCID-gyf5-px5b-67dc","summary":"Multiple vulnerabilities have been reported in SeaMonkey, some of which may\n    allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0801","reference_id":"","reference_type":"","scores":[{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7352","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7339","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73421","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73444","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73448","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73483","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73485","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73518","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73527","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.osvdb.org/32108","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32108"},{"reference_url":"http://www.securityfocus.com/archive/1/459162/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/459162/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/459163/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/459163/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22396","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22396"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0801","reference_id":"CVE-2007-0801","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0801"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0801"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gyf5-px5b-67dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59562?format=json","vulnerability_id":"VCID-p5pk-vdvp-q7ar","summary":"Multiple vulnerabilities have been reported in SeaMonkey, some of which may\n    allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052209.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052209.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052211.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052211.html"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0800.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0800","reference_id":"","reference_type":"","scores":[{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89354","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89342","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89265","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89271","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89315","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89312","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89325","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89324","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.8932","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04655","scoring_system":"epss","scoring_elements":"0.89337","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0800"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32194","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32194"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10654","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10654"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-05.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-05.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.osvdb.org/32108","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32108"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/459162/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/459162/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/459163/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/459163/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22396","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22396"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.securitytracker.com/id?1017702","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017702"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618279","reference_id":"1618279","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618279"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800","reference_id":"CVE-2007-0800","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0800","reference_id":"CVE-2007-0800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0800"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-05","reference_id":"mfsa2007-05","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0800"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5pk-vdvp-q7ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59565?format=json","vulnerability_id":"VCID-qxqf-6kdy-nyap","summary":"Multiple vulnerabilities have been reported in SeaMonkey, some of which may\n    allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://ha.ckers.org/xss.html#XSS_Non_alpha_non_digit2","reference_id":"","reference_type":"","scores":[],"url":"http://ha.ckers.org/xss.html#XSS_Non_alpha_non_digit2"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://osvdb.org/32112","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/32112"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0995.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0995.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0995","reference_id":"","reference_type":"","scores":[{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84424","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84331","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84358","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84376","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84387","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.8439","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84416","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0995"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24455","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24455"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://secunia.com/advisories/25588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25588"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10164","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10164"},{"reference_url":"http://www.debian.org/security/2007/dsa-1336","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1336"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-02.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-02.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.osvdb.org/32111","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32111"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.securitytracker.com/id?1017702","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017702"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618287","reference_id":"1618287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618287"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995","reference_id":"CVE-2007-0995","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0995","reference_id":"CVE-2007-0995","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0995"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-02","reference_id":"mfsa2007-02","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0995"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qxqf-6kdy-nyap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59564?format=json","vulnerability_id":"VCID-z276-uc3n-8fhx","summary":"Multiple vulnerabilities have been reported in SeaMonkey, some of which may\n    allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lcamtuf.dione.cc/ffhostname.html","reference_id":"","reference_type":"","scores":[],"url":"http://lcamtuf.dione.cc/ffhostname.html"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0981.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0981.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0981","reference_id":"","reference_type":"","scores":[{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94906","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94857","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.9486","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94862","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94875","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94894","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16432","scoring_system":"epss","scoring_elements":"0.94897","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0981"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=370445","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=370445"},{"reference_url":"http://secunia.com/advisories/24175","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24175"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24455","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24455"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://secunia.com/advisories/25588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25588"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"http://securityreason.com/securityalert/2262","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/2262"},{"reference_url":"http://securitytracker.com/id?1017654","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017654"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32533","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32533"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9730","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9730"},{"reference_url":"http://www.debian.org/security/2007/dsa-1336","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1336"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.kb.cert.org/vuls/id/885753","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/885753"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-07.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-07.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.osvdb.org/32104","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32104"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/460126/100/200/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/460126/100/200/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/460217/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/460217/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22566","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22566"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0624","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0624"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=229253","reference_id":"229253","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=229253"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:preview_release:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:preview_release:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:preview_release:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981","reference_id":"CVE-2007-0981","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0981","reference_id":"CVE-2007-0981","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0981"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-07","reference_id":"mfsa2007-07","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-07"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/3340.html","reference_id":"OSVDB-32104;CVE-2007-0981","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/3340.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0981"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z276-uc3n-8fhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59557?format=json","vulnerability_id":"VCID-zthy-y4qb-eyes","summary":"Multiple vulnerabilities have been reported in SeaMonkey, some of which may\n    allow user-assisted arbitrary remote code execution.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2713","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2713"},{"reference_url":"http://fedoranews.org/cms/node/2728","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2728"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0778.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0778","reference_id":"","reference_type":"","scores":[{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78335","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78184","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78306","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78322","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78193","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78223","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78241","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78273","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7827","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.783","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0778"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=347852","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=347852"},{"reference_url":"http://secunia.com/advisories/24205","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24205"},{"reference_url":"http://secunia.com/advisories/24238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24238"},{"reference_url":"http://secunia.com/advisories/24287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24287"},{"reference_url":"http://secunia.com/advisories/24290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24290"},{"reference_url":"http://secunia.com/advisories/24293","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24293"},{"reference_url":"http://secunia.com/advisories/24320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24320"},{"reference_url":"http://secunia.com/advisories/24328","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24328"},{"reference_url":"http://secunia.com/advisories/24333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24333"},{"reference_url":"http://secunia.com/advisories/24342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24342"},{"reference_url":"http://secunia.com/advisories/24343","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24343"},{"reference_url":"http://secunia.com/advisories/24384","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24384"},{"reference_url":"http://secunia.com/advisories/24393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24393"},{"reference_url":"http://secunia.com/advisories/24395","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24395"},{"reference_url":"http://secunia.com/advisories/24437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24437"},{"reference_url":"http://secunia.com/advisories/24455","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24455"},{"reference_url":"http://secunia.com/advisories/24457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24457"},{"reference_url":"http://secunia.com/advisories/24650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24650"},{"reference_url":"http://secunia.com/advisories/25588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25588"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml"},{"reference_url":"http://securitytracker.com/id?1017699","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017699"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32671","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32671"},{"reference_url":"https://issues.rpath.com/browse/RPL-1081","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1081"},{"reference_url":"https://issues.rpath.com/browse/RPL-1103","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1103"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9151","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9151"},{"reference_url":"http://www.debian.org/security/2007/dsa-1336","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1336"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050"},{"reference_url":"http://www.mozilla.org/security/announce/2007/mfsa2007-03.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-03.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html"},{"reference_url":"http://www.osvdb.org/32110","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/32110"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"reference_url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22694"},{"reference_url":"http://www.ubuntu.com/usn/usn-428-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-428-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0718","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0718"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0083","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618276","reference_id":"1618276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618276"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778","reference_id":"CVE-2007-0778","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0778","reference_id":"CVE-2007-0778","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0778"},{"reference_url":"https://security.gentoo.org/glsa/200703-04","reference_id":"GLSA-200703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-04"},{"reference_url":"https://security.gentoo.org/glsa/200703-08","reference_id":"GLSA-200703-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-03","reference_id":"mfsa2007-03","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2007-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0077","reference_id":"RHSA-2007:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0078","reference_id":"RHSA-2007:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0079","reference_id":"RHSA-2007:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0097","reference_id":"RHSA-2007:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0108","reference_id":"RHSA-2007:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0108"},{"reference_url":"https://usn.ubuntu.com/428-1/","reference_id":"USN-428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/428-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84618?format=json","purl":"pkg:ebuild/www-client/seamonkey-bin@1.1.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}],"aliases":["CVE-2007-0778"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zthy-y4qb-eyes"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey-bin@1.1.1"}