fkie_cve-2007-3735
Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
References
secalert@redhat.comftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
secalert@redhat.comhttp://secunia.com/advisories/25589
secalert@redhat.comhttp://secunia.com/advisories/26072
secalert@redhat.comhttp://secunia.com/advisories/26095Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/26096
secalert@redhat.comhttp://secunia.com/advisories/26103
secalert@redhat.comhttp://secunia.com/advisories/26106
secalert@redhat.comhttp://secunia.com/advisories/26107
secalert@redhat.comhttp://secunia.com/advisories/26149
secalert@redhat.comhttp://secunia.com/advisories/26151
secalert@redhat.comhttp://secunia.com/advisories/26159
secalert@redhat.comhttp://secunia.com/advisories/26176
secalert@redhat.comhttp://secunia.com/advisories/26179
secalert@redhat.comhttp://secunia.com/advisories/26204
secalert@redhat.comhttp://secunia.com/advisories/26205
secalert@redhat.comhttp://secunia.com/advisories/26211
secalert@redhat.comhttp://secunia.com/advisories/26216
secalert@redhat.comhttp://secunia.com/advisories/26258
secalert@redhat.comhttp://secunia.com/advisories/26271
secalert@redhat.comhttp://secunia.com/advisories/26460
secalert@redhat.comhttp://secunia.com/advisories/26572
secalert@redhat.comhttp://secunia.com/advisories/27326
secalert@redhat.comhttp://secunia.com/advisories/28135
secalert@redhat.comhttp://secunia.com/advisories/28363
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
secalert@redhat.comhttp://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1337
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1338
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1339
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1391
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200708-09.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:152
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2007:047
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:047
secalert@redhat.comhttp://www.mozilla.org/security/announce/2007/mfsa2007-18.html
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2007_49_mozilla.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0722.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0723.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0724.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/474226/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/474542/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/24946
secalert@redhat.comhttp://www.securitytracker.com/id?1018408
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-490-1
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-503-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2564
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2565
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/4256
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/0082
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/35459
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11066
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25589
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26072
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26095Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26096
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26103
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26106
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26107
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26149
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26151
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26159
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26176
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26179
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26204
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26205
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26211
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26216
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26258
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26271
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26460
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26572
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27326
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28135
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28363
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
af854a3a-2127-422b-91ae-364da2661108http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1337
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1338
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1339
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1391
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200708-09.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:152
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2007:047
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:047
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/security/announce/2007/mfsa2007-18.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_49_mozilla.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0722.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0723.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0724.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/474226/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/474542/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24946
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018408
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-490-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-503-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2564
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2565
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4256
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0082
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35459
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11066
Impacted products
Vendor Product Version
mozilla firefox 2.0
mozilla firefox 2.0.0.1
mozilla firefox 2.0.0.2
mozilla firefox 2.0.0.3
mozilla firefox 2.0.0.4
mozilla thunderbird 2.0.0.0
mozilla thunderbird 2.0.0.1
mozilla thunderbird 2.0.0.2
mozilla thunderbird 2.0.0.3
mozilla thunderbird 2.0.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3487FA64-BE04-42CA-861E-3DAC097D7D32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D956DC-C73B-439F-8D79-8239207CC76F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E2C7E7-56C0-466C-BB08-5EB43922C4F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "462E135A-5616-46CC-A9C0-5A7A0526ACC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6121F9C1-F4DF-4AAB-9E51-AC1592AA5639",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFC60781-766B-4B9C-B68D-45D51C5E5D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "745C2CBA-4824-441B-A6BC-E80959C2E035",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C6A7D00-A203-4891-96CE-20C91FCBF048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A8CB480-0595-4BC1-998E-3638E85DB367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC7EAB8D-CA40-4C29-99DF-24FF1753BCF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en el motor JavaScript de Mozilla Firefox anterior a 2.0.0.5 y Thunderbird anterior a 2.0.0.5 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores no especificados que disparan una corrupci\u00f3n de memoria."
    }
  ],
  "id": "CVE-2007-3735",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-07-18T17:30:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25589"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26072"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26095"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26096"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26103"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26106"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26107"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26149"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26151"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26159"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26176"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26179"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26204"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26205"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26211"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26216"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26258"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26271"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26460"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26572"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/27326"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28135"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28363"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1337"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1338"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1339"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1391"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-09.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:152"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2007:047"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:047"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-18.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.novell.com/linux/security/advisories/2007_49_mozilla.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0722.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0723.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0724.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/24946"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1018408"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-490-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-503-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2564"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2565"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/4256"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/0082"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35459"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11066"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25589"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26095"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26204"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26211"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26460"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26572"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1338"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1339"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200708-09.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2007:047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mozilla.org/security/announce/2007/mfsa2007-18.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_49_mozilla.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0722.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0723.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0724.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24946"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-490-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-503-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2564"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11066"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…