CVE-2007-5340 : Détail

CVE-2007-5340

A03-Injection
51.01%V3
Network
2007-10-21 17:00 +00:00
2018-10-15 18:57 +00:00

Alerte pour un CVE

Restez informé de toutes modifications pour un CVE spécifique.
Gestion des alertes

Descriptions

Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.

Informations

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Metrics

Metric Score Sévérité CVSS Vecteur Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

EPSS Score

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

EPSS Percentile

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version To (including) 2.0.0.7

Mozilla>>Seamonkey >> Version To (including) 1.1.4

Mozilla>>Thunderbird >> Version To (including) 2.0.0.6

References

http://securitytracker.com/id?1018835
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2007/3545
Tags : vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2008:047
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.kb.cert.org/vuls/id/755513
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.vupen.com/english/advisories/2007/3587
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27414
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0643
Tags : vdb-entry, x_refsource_VUPEN
http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/27360
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27298
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27315
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27327
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/3544
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27276
Tags : third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/535-1/
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2007/dsa-1391
Tags : vendor-advisory, x_refsource_DEBIAN
http://security.gentoo.org/glsa/glsa-200711-24.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/28179
Tags : third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1018834
Tags : vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2007/dsa-1401
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2007/dsa-1392
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2007-0980.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/27383
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2007:047
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/27356
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0981.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/27704
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0083
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27387
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27313
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27403
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27336
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0082
Tags : vdb-entry, x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-231441-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://www.debian.org/security/2007/dsa-1396
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/27425
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28398
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/4272
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27311
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27325
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27665
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0979.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/27335
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28636
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27326
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28363
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27480
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27680
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/26132
Tags : vdb-entry, x_refsource_BID
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://www.ubuntu.com/usn/usn-536-1
Tags : vendor-advisory, x_refsource_UBUNTU
Cliquez sur le bouton à gauche (OFF), pour autoriser l'inscription de cookie améliorant les fonctionnalités du site. Cliquez sur le bouton à gauche (Tout accepter), pour ne plus autoriser l'inscription de cookie améliorant les fonctionnalités du site.