Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://fedoranews.org/cms/node/2747 - | |
References | () http://fedoranews.org/cms/node/2749 - | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579 - | |
References | () http://osvdb.org/35138 - | |
References | () http://secunia.com/advisories/24406 - Vendor Advisory | |
References | () http://secunia.com/advisories/24456 - Vendor Advisory | |
References | () http://secunia.com/advisories/25469 - Vendor Advisory | |
References | () http://secunia.com/advisories/25476 - Vendor Advisory | |
References | () http://secunia.com/advisories/25488 - Vendor Advisory | |
References | () http://secunia.com/advisories/25489 - Vendor Advisory | |
References | () http://secunia.com/advisories/25490 - Vendor Advisory | |
References | () http://secunia.com/advisories/25491 - Vendor Advisory | |
References | () http://secunia.com/advisories/25492 - Vendor Advisory | |
References | () http://secunia.com/advisories/25496 - Vendor Advisory | |
References | () http://secunia.com/advisories/25533 - Vendor Advisory | |
References | () http://secunia.com/advisories/25534 - Vendor Advisory | |
References | () http://secunia.com/advisories/25559 - Vendor Advisory | |
References | () http://secunia.com/advisories/25635 - Vendor Advisory | |
References | () http://secunia.com/advisories/25644 - Vendor Advisory | |
References | () http://secunia.com/advisories/25647 - Vendor Advisory | |
References | () http://secunia.com/advisories/25664 - Vendor Advisory | |
References | () http://secunia.com/advisories/25685 - Vendor Advisory | |
References | () http://secunia.com/advisories/25750 - Vendor Advisory | |
References | () http://secunia.com/advisories/25858 - | |
References | () http://secunia.com/advisories/27427 - | |
References | () http://secunia.com/advisories/28363 - | |
References | () http://security.gentoo.org/glsa/glsa-200706-06.xml - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-103125-1 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-201505-1 - | |
References | () http://www.debian.org/security/2007/dsa-1300 - | |
References | () http://www.debian.org/security/2007/dsa-1305 - | |
References | () http://www.debian.org/security/2007/dsa-1306 - | |
References | () http://www.debian.org/security/2007/dsa-1308 - | |
References | () http://www.kb.cert.org/vuls/id/609956 - US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:119 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:120 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:131 - | |
References | () http://www.mozilla.org/security/announce/2007/mfsa2007-12.html - Vendor Advisory | |
References | () http://www.novell.com/linux/security/advisories/2007_36_mozilla.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0400.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0401.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0402.html - | |
References | () http://www.securityfocus.com/archive/1/470172/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/471842/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/24242 - | |
References | () http://www.securitytracker.com/id?1018151 - | |
References | () http://www.securitytracker.com/id?1018152 - | |
References | () http://www.securitytracker.com/id?1018153 - | |
References | () http://www.ubuntu.com/usn/usn-468-1 - | |
References | () http://www.ubuntu.com/usn/usn-469-1 - | |
References | () http://www.us-cert.gov/cas/techalerts/TA07-151A.html - US Government Resource | |
References | () http://www.vupen.com/english/advisories/2007/1994 - | |
References | () http://www.vupen.com/english/advisories/2007/3632 - | |
References | () http://www.vupen.com/english/advisories/2008/0082 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34605 - | |
References | () https://issues.rpath.com/browse/RPL-1424 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10711 - |
Information
Published : 2007-06-01 00:30
Updated : 2024-11-21 00:31
NVD link : CVE-2007-2868
Mitre link : CVE-2007-2868
CVE.ORG link : CVE-2007-2868
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- seamonkey
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')