CVE-2007-2869 : Detail

CVE-2007-2869

12.55%V3
Network
2007-05-31
22h00 +00:00
2018-10-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version 1.5

Mozilla>>Firefox >> Version 1.5.0.1

Mozilla>>Firefox >> Version 1.5.0.2

Mozilla>>Firefox >> Version 1.5.0.3

Mozilla>>Firefox >> Version 1.5.0.4

Mozilla>>Firefox >> Version 1.5.0.5

Mozilla>>Firefox >> Version 1.5.0.6

Mozilla>>Firefox >> Version 1.5.0.7

Mozilla>>Firefox >> Version 1.5.0.8

Mozilla>>Firefox >> Version 1.5.0.9

Mozilla>>Firefox >> Version 1.5.0.10

Mozilla>>Firefox >> Version 1.5.0.11

Mozilla>>Firefox >> Version 2.0

Mozilla>>Firefox >> Version 2.0.0.1

Mozilla>>Firefox >> Version 2.0.0.2

Mozilla>>Firefox >> Version 2.0.0.3

References

http://www.debian.org/security/2007/dsa-1308
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2007:120
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/25647
Tags : third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200706-06.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/25635
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25534
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1994
Tags : vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2007-0400.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/25533
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2007/dsa-1306
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/25858
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-468-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2007-0401.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/25476
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:126
Tags : vendor-advisory, x_refsource_MANDRIVA
http://osvdb.org/35135
Tags : vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/24242
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/25750
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25490
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0402.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.us-cert.gov/cas/techalerts/TA07-151A.html
Tags : third-party-advisory, x_refsource_CERT
http://secunia.com/advisories/25685
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1018154
Tags : vdb-entry, x_refsource_SECTRACK