Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-1836 (GCVE-0-2009-1836)
Vulnerability from cvelistv5 – Published: 2009-06-12 21:07 – Updated: 2024-08-07 05:27- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:27:54.628Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2009-1572",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1572"
},
{
"name": "SSA:2009-178-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.454275"
},
{
"name": "DSA-1830",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1830"
},
{
"name": "35536",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35536"
},
{
"name": "35602",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35602"
},
{
"name": "oval:org.mitre.oval:def:11764",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764"
},
{
"name": "FEDORA-2009-7614",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html"
},
{
"name": "35326",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35326"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
},
{
"name": "35440",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35440"
},
{
"name": "FEDORA-2009-6411",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html"
},
{
"name": "USN-782-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-782-1"
},
{
"name": "35431",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35431"
},
{
"name": "FEDORA-2009-7567",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html"
},
{
"name": "35331",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35331"
},
{
"name": "35468",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35468"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf"
},
{
"name": "35439",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35439"
},
{
"name": "35882",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35882"
},
{
"name": "FEDORA-2009-6366",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html"
},
{
"name": "MDVSA-2009:141",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:141"
},
{
"name": "35415",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35415"
},
{
"name": "RHSA-2009:1095",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1095.html"
},
{
"name": "35380",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35380"
},
{
"name": "SSA:2009-167-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.372468"
},
{
"name": "35561",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35561"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503578"
},
{
"name": "55160",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/55160"
},
{
"name": "SSA:2009-176-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.425408"
},
{
"name": "DSA-1820",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1820"
},
{
"name": "RHSA-2009:1126",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1126.html"
},
{
"name": "264308",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1"
},
{
"name": "1022396",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022396"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-06-11T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an \"SSL tampering\" attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "ADV-2009-1572",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1572"
},
{
"name": "SSA:2009-178-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.454275"
},
{
"name": "DSA-1830",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1830"
},
{
"name": "35536",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35536"
},
{
"name": "35602",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35602"
},
{
"name": "oval:org.mitre.oval:def:11764",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764"
},
{
"name": "FEDORA-2009-7614",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html"
},
{
"name": "35326",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35326"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
},
{
"name": "35440",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35440"
},
{
"name": "FEDORA-2009-6411",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html"
},
{
"name": "USN-782-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-782-1"
},
{
"name": "35431",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35431"
},
{
"name": "FEDORA-2009-7567",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html"
},
{
"name": "35331",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35331"
},
{
"name": "35468",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35468"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf"
},
{
"name": "35439",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35439"
},
{
"name": "35882",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35882"
},
{
"name": "FEDORA-2009-6366",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html"
},
{
"name": "MDVSA-2009:141",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:141"
},
{
"name": "35415",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35415"
},
{
"name": "RHSA-2009:1095",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1095.html"
},
{
"name": "35380",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35380"
},
{
"name": "SSA:2009-167-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.372468"
},
{
"name": "35561",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35561"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503578"
},
{
"name": "55160",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/55160"
},
{
"name": "SSA:2009-176-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.425408"
},
{
"name": "DSA-1820",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1820"
},
{
"name": "RHSA-2009:1126",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1126.html"
},
{
"name": "264308",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1"
},
{
"name": "1022396",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022396"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2009-1836",
"datePublished": "2009-06-12T21:07:00.000Z",
"dateReserved": "2009-05-29T00:00:00.000Z",
"dateUpdated": "2024-08-07T05:27:54.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-XW48-X32W-4M9R
Vulnerability from github – Published: 2022-05-02 03:29 – Updated: 2022-05-02 03:29Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
{
"affected": [],
"aliases": [
"CVE-2009-1836"
],
"database_specific": {
"cwe_ids": [
"CWE-287"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-06-12T21:30:00Z",
"severity": "MODERATE"
},
"details": "Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an \"SSL tampering\" attack.",
"id": "GHSA-xw48-x32w-4m9r",
"modified": "2022-05-02T03:29:08Z",
"published": "2022-05-02T03:29:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1836"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503578"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764"
},
{
"type": "WEB",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1095.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html"
},
{
"type": "WEB",
"url": "http://osvdb.org/55160"
},
{
"type": "WEB",
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
},
{
"type": "WEB",
"url": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35331"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35415"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35431"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35439"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35440"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35468"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35536"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35561"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35602"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35882"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.372468"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.425408"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1820"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1830"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:141"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1126.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/35326"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/35380"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1022396"
},
{
"type": "WEB",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.454275"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-782-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1572"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2009-1836
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-1836",
"description": "Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an \"SSL tampering\" attack.",
"id": "GSD-2009-1836",
"references": [
"https://www.suse.com/security/cve/CVE-2009-1836.html",
"https://www.debian.org/security/2009/dsa-1830",
"https://www.debian.org/security/2009/dsa-1820",
"https://access.redhat.com/errata/RHSA-2009:1126",
"https://access.redhat.com/errata/RHSA-2009:1095",
"https://linux.oracle.com/cve/CVE-2009-1836.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-1836"
],
"details": "Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an \"SSL tampering\" attack.",
"id": "GSD-2009-1836",
"modified": "2023-12-13T01:19:47.870263Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1836",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an \"SSL tampering\" attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/advisories/35331",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35331"
},
{
"name": "http://secunia.com/advisories/35415",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35415"
},
{
"name": "http://secunia.com/advisories/35431",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35431"
},
{
"name": "http://secunia.com/advisories/35439",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35439"
},
{
"name": "http://secunia.com/advisories/35440",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35440"
},
{
"name": "http://secunia.com/advisories/35468",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35468"
},
{
"name": "http://secunia.com/advisories/35561",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35561"
},
{
"name": "http://secunia.com/advisories/35602",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35602"
},
{
"name": "http://secunia.com/advisories/35882",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35882"
},
{
"name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.372468",
"refsource": "MISC",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.372468"
},
{
"name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.425408",
"refsource": "MISC",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.425408"
},
{
"name": "http://www.debian.org/security/2009/dsa-1820",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1820"
},
{
"name": "http://www.debian.org/security/2009/dsa-1830",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1830"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:141",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:141"
},
{
"name": "http://www.securityfocus.com/bid/35326",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/35326"
},
{
"name": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.454275",
"refsource": "MISC",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.454275"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1572",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1572"
},
{
"name": "https://rhn.redhat.com/errata/RHSA-2009-1095.html",
"refsource": "MISC",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1095.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1",
"refsource": "MISC",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1"
},
{
"name": "http://secunia.com/advisories/35536",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35536"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-1126.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1126.html"
},
{
"name": "http://www.ubuntu.com/usn/usn-782-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-782-1"
},
{
"name": "http://osvdb.org/55160",
"refsource": "MISC",
"url": "http://osvdb.org/55160"
},
{
"name": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
"refsource": "MISC",
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
},
{
"name": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf",
"refsource": "MISC",
"url": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf"
},
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html",
"refsource": "MISC",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
},
{
"name": "http://www.securityfocus.com/bid/35380",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/35380"
},
{
"name": "http://www.securitytracker.com/id?1022396",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1022396"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=503578",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503578"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0_.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0_.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:beta:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.5:1.1.10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0_.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0_.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1.16",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0_.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0_.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0_.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0_8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.0.0.19",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.0.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0beta5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1836"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an \"SSL tampering\" attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
"refsource": "MISC",
"tags": [],
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
},
{
"name": "35440",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35440"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=503578",
"refsource": "CONFIRM",
"tags": [
"Exploit"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503578"
},
{
"name": "35431",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35431"
},
{
"name": "35439",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35439"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880",
"refsource": "CONFIRM",
"tags": [
"Exploit"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880"
},
{
"name": "RHSA-2009:1095",
"refsource": "REDHAT",
"tags": [
"Patch"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1095.html"
},
{
"name": "ADV-2009-1572",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1572"
},
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
},
{
"name": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf",
"refsource": "MISC",
"tags": [],
"url": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf"
},
{
"name": "35331",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35331"
},
{
"name": "35326",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/35326"
},
{
"name": "35380",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/35380"
},
{
"name": "FEDORA-2009-6366",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html"
},
{
"name": "1022396",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022396"
},
{
"name": "FEDORA-2009-6411",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html"
},
{
"name": "55160",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/55160"
},
{
"name": "35468",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35468"
},
{
"name": "DSA-1820",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2009/dsa-1820"
},
{
"name": "USN-782-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-782-1"
},
{
"name": "RHSA-2009:1126",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1126.html"
},
{
"name": "35536",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35536"
},
{
"name": "35602",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35602"
},
{
"name": "35561",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35561"
},
{
"name": "MDVSA-2009:141",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:141"
},
{
"name": "SSA:2009-176-01",
"refsource": "SLACKWARE",
"tags": [],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.425408"
},
{
"name": "SSA:2009-178-01",
"refsource": "SLACKWARE",
"tags": [],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.454275"
},
{
"name": "35415",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35415"
},
{
"name": "SSA:2009-167-01",
"refsource": "SLACKWARE",
"tags": [],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.372468"
},
{
"name": "FEDORA-2009-7614",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html"
},
{
"name": "35882",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35882"
},
{
"name": "FEDORA-2009-7567",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html"
},
{
"name": "264308",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1"
},
{
"name": "DSA-1830",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2009/dsa-1830"
},
{
"name": "oval:org.mitre.oval:def:11764",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2018-10-30T16:25Z",
"publishedDate": "2009-06-12T21:30Z"
}
}
}
CERTA-2009-AVI-251
Vulnerability from certfr_avis - Published: 2009-06-24 - Updated: 2009-06-24
De multiples vulnérabilités permettant entre autre d'exécuter du code arbitraire à distance ont été découvertes dans Mozilla Thunderbird.
Description
De multiples vulnérabilités ont été découvertes dans le client de messagerie Mozilla Thunderbird. L'exploitation de ces vulnérabilités permet de réaliser un grand nombre d'actions malveillantes, dont l'exécution de code arbitraire à distance ou le déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mozilla Thunderbird versions antérieures à la version 2.0.22.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eMozilla Thunderbird versions ant\u00e9rieures \u00e0 la version 2.0.22.\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le client de\nmessagerie Mozilla Thunderbird. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s\npermet de r\u00e9aliser un grand nombre d\u0027actions malveillantes, dont\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance ou le d\u00e9ni de service \u00e0\ndistance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-1832",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1832"
},
{
"name": "CVE-2009-1841",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1841"
},
{
"name": "CVE-2009-1392",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1392"
},
{
"name": "CVE-2009-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1838"
},
{
"name": "CVE-2009-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1840"
},
{
"name": "CVE-2009-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1833"
},
{
"name": "CVE-2009-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1836"
}
],
"initial_release_date": "2009-06-24T00:00:00",
"last_revision_date": "2009-06-24T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-33 du 23 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-33.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-24 du 23 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-24.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-31 du 23 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-31.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-29 du 23 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-29.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-27 du 23 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-32 du 23 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-32.html"
}
],
"reference": "CERTA-2009-AVI-251",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-06-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s permettant entre autre d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Thunderbird.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s du client de messagerie Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de mise \u00e0 jour Mozilla Thunderbird du 23 juin 2009",
"url": null
}
]
}
CERTA-2009-AVI-233
Vulnerability from certfr_avis - Published: 2009-06-12 - Updated: 2009-06-12
De multiples vulnérabilités dans Mozilla Firefox permettent, entre autres, à une personne malveillante d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités dans Mozilla Firefox ont été découvertes :
- plusieurs vulnérabilités dans le moteur du navigateur permettent une exécution de code arbitraire à distance (CVE-2009-1392, CVE-2009-1832 et CVE-2009-1833) ;
- une erreur dans l'interprétation de certains caractères unicode permet à une personne malveillante d'afficher une URL trompeuse (CVE-2009-1834) ;
- une ressource locale exécutée via le protocole file: permet d'accéder aux fichiers de session de l'utilisateur (CVE-2009-1835) ;
- une erreur dans la gestion des réponses différentes du code « 200 » après une requête CONNECT à un serveur mandataire permet à une personne malveillante d'exécuter du code arbitraire (CVE-2009-1836) ;
- une erreur dans la gestion des objets Java permet à une personne distante d'exécuter du code arbitraire (CVE-2009-1837) ;
- une erreur dans l'interpréteur d'événements permet d'exécuter du code JavaScript avec les privilèges chrome (CVE-2009-1838) ;
- une erreur dans la gestion des permissions via le protocole file: permet à un nouveau document chargé d'obtenir des droits du document précédemment ouvert (CVE-2009-1839) ;
- une vulnérabilité existe dans le contrôle des politiques de chargement de contenu avant l'exécution de scripts externes d'un fichier XUL (CVE-2009-1840) ;
- une erreur lorsqu'un objet avec les droits chrome interagit avec du contenu web permet à une personne malintentionnée d'exécuter du code arbitraire.
Solution
Se référer aux bulletins de sécurité Mozilla pour l'obtention des correctifs (cf. section Documentation).
Mozilla Firefox, toutes versions antérieures à la 3.0.11.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMozilla Firefox, toutes versions ant\u00e9rieures \u00e0 la 3.0.11.\u003c/P\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans Mozilla Firefox ont \u00e9t\u00e9 d\u00e9couvertes :\n\n- plusieurs vuln\u00e9rabilit\u00e9s dans le moteur du navigateur permettent une\n ex\u00e9cution de code arbitraire \u00e0 distance (CVE-2009-1392,\n CVE-2009-1832 et CVE-2009-1833) ;\n- une erreur dans l\u0027interpr\u00e9tation de certains caract\u00e8res unicode\n permet \u00e0 une personne malveillante d\u0027afficher une URL trompeuse\n (CVE-2009-1834) ;\n- une ressource locale ex\u00e9cut\u00e9e via le protocole file: permet\n d\u0027acc\u00e9der aux fichiers de session de l\u0027utilisateur (CVE-2009-1835) ;\n- une erreur dans la gestion des r\u00e9ponses diff\u00e9rentes du code \u00ab 200 \u00bb\n apr\u00e8s une requ\u00eate CONNECT \u00e0 un serveur mandataire permet \u00e0 une\n personne malveillante d\u0027ex\u00e9cuter du code arbitraire (CVE-2009-1836)\n ;\n- une erreur dans la gestion des objets Java permet \u00e0 une personne\n distante d\u0027ex\u00e9cuter du code arbitraire (CVE-2009-1837) ;\n- une erreur dans l\u0027interpr\u00e9teur d\u0027\u00e9v\u00e9nements permet d\u0027ex\u00e9cuter du\n code JavaScript avec les privil\u00e8ges chrome (CVE-2009-1838) ;\n- une erreur dans la gestion des permissions via le protocole file:\n permet \u00e0 un nouveau document charg\u00e9 d\u0027obtenir des droits du document\n pr\u00e9c\u00e9demment ouvert (CVE-2009-1839) ;\n- une vuln\u00e9rabilit\u00e9 existe dans le contr\u00f4le des politiques de\n chargement de contenu avant l\u0027ex\u00e9cution de scripts externes d\u0027un\n fichier XUL (CVE-2009-1840) ;\n- une erreur lorsqu\u0027un objet avec les droits chrome interagit avec du\n contenu web permet \u00e0 une personne malintentionn\u00e9e d\u0027ex\u00e9cuter du code\n arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 Mozilla pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-1832",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1832"
},
{
"name": "CVE-2009-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1839"
},
{
"name": "CVE-2009-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1837"
},
{
"name": "CVE-2009-1841",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1841"
},
{
"name": "CVE-2009-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1834"
},
{
"name": "CVE-2009-1392",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1392"
},
{
"name": "CVE-2009-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1838"
},
{
"name": "CVE-2009-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1840"
},
{
"name": "CVE-2009-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1833"
},
{
"name": "CVE-2009-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1836"
},
{
"name": "CVE-2009-1835",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1835"
}
],
"initial_release_date": "2009-06-12T00:00:00",
"last_revision_date": "2009-06-12T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-30 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-30.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-31 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-31.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-26 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-26.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-25 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-25.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-28 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-28.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-32 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-32.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-24 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-24.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-29 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-29.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2009-27 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
}
],
"reference": "CERTA-2009-AVI-233",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-06-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox permettent, entre\nautres, \u00e0 une personne malveillante d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance.\n",
"title": "Mulitples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Mozilla MFSA 2009-24 \u00e0 2009-32 du 11 juin 2009",
"url": null
}
]
}
FKIE_CVE-2009-1836
Vulnerability from fkie_nvd - Published: 2009-06-12 21:30 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://osvdb.org/55160 | ||
| secalert@redhat.com | http://research.microsoft.com/apps/pubs/default.aspx?id=79323 | ||
| secalert@redhat.com | http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf | ||
| secalert@redhat.com | http://secunia.com/advisories/35331 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35415 | ||
| secalert@redhat.com | http://secunia.com/advisories/35431 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35439 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35440 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35468 | ||
| secalert@redhat.com | http://secunia.com/advisories/35536 | ||
| secalert@redhat.com | http://secunia.com/advisories/35561 | ||
| secalert@redhat.com | http://secunia.com/advisories/35602 | ||
| secalert@redhat.com | http://secunia.com/advisories/35882 | ||
| secalert@redhat.com | http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 | ||
| secalert@redhat.com | http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.425408 | ||
| secalert@redhat.com | http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 | ||
| secalert@redhat.com | http://www.debian.org/security/2009/dsa-1820 | ||
| secalert@redhat.com | http://www.debian.org/security/2009/dsa-1830 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2009:141 | ||
| secalert@redhat.com | http://www.mozilla.org/security/announce/2009/mfsa2009-27.html | Vendor Advisory | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1126.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/35326 | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/35380 | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1022396 | ||
| secalert@redhat.com | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.454275 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-782-1 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1572 | Patch, Vendor Advisory | |
| secalert@redhat.com | https://bugzilla.mozilla.org/show_bug.cgi?id=479880 | Exploit | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=503578 | Exploit | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764 | ||
| secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2009-1095.html | Patch | |
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/55160 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://research.microsoft.com/apps/pubs/default.aspx?id=79323 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35331 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35415 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35431 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35439 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35440 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35468 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35536 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35561 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35602 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35882 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.425408 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1820 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1830 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:141 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mozilla.org/security/announce/2009/mfsa2009-27.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1126.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35326 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35380 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022396 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.454275 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-782-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1572 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=479880 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=503578 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1095.html | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox | 0.1 | |
| mozilla | firefox | 0.2 | |
| mozilla | firefox | 0.3 | |
| mozilla | firefox | 0.4 | |
| mozilla | firefox | 0.5 | |
| mozilla | firefox | 0.6 | |
| mozilla | firefox | 0.6.1 | |
| mozilla | firefox | 0.7 | |
| mozilla | firefox | 0.7.1 | |
| mozilla | firefox | 0.8 | |
| mozilla | firefox | 0.9 | |
| mozilla | firefox | 0.9 | |
| mozilla | firefox | 0.9.1 | |
| mozilla | firefox | 0.9.2 | |
| mozilla | firefox | 0.9.3 | |
| mozilla | firefox | 0.9_rc | |
| mozilla | firefox | 0.10 | |
| mozilla | firefox | 0.10.1 | |
| mozilla | firefox | 1.0 | |
| mozilla | firefox | 1.0 | |
| mozilla | firefox | 1.0.1 | |
| mozilla | firefox | 1.0.2 | |
| mozilla | firefox | 1.0.3 | |
| mozilla | firefox | 1.0.4 | |
| mozilla | firefox | 1.0.5 | |
| mozilla | firefox | 1.0.6 | |
| mozilla | firefox | 1.0.6 | |
| mozilla | firefox | 1.0.7 | |
| mozilla | firefox | 1.0.8 | |
| mozilla | firefox | 1.4.1 | |
| mozilla | firefox | 1.5 | |
| mozilla | firefox | 1.5 | |
| mozilla | firefox | 1.5 | |
| mozilla | firefox | 1.5.0.1 | |
| mozilla | firefox | 1.5.0.2 | |
| mozilla | firefox | 1.5.0.3 | |
| mozilla | firefox | 1.5.0.4 | |
| mozilla | firefox | 1.5.0.5 | |
| mozilla | firefox | 1.5.0.6 | |
| mozilla | firefox | 1.5.0.7 | |
| mozilla | firefox | 1.5.0.8 | |
| mozilla | firefox | 1.5.0.9 | |
| mozilla | firefox | 1.5.0.10 | |
| mozilla | firefox | 1.5.0.11 | |
| mozilla | firefox | 1.5.0.12 | |
| mozilla | firefox | 1.5.1 | |
| mozilla | firefox | 1.5.2 | |
| mozilla | firefox | 1.5.3 | |
| mozilla | firefox | 1.5.4 | |
| mozilla | firefox | 1.5.5 | |
| mozilla | firefox | 1.5.6 | |
| mozilla | firefox | 1.5.7 | |
| mozilla | firefox | 1.5.8 | |
| mozilla | firefox | 1.8 | |
| mozilla | firefox | 2.0 | |
| mozilla | firefox | 2.0 | |
| mozilla | firefox | 2.0 | |
| mozilla | firefox | 2.0 | |
| mozilla | firefox | 2.0 | |
| mozilla | firefox | 2.0.0.1 | |
| mozilla | firefox | 2.0.0.2 | |
| mozilla | firefox | 2.0.0.3 | |
| mozilla | firefox | 2.0.0.4 | |
| mozilla | firefox | 2.0.0.5 | |
| mozilla | firefox | 2.0.0.6 | |
| mozilla | firefox | 2.0.0.7 | |
| mozilla | firefox | 2.0.0.8 | |
| mozilla | firefox | 2.0.0.9 | |
| mozilla | firefox | 2.0.0.10 | |
| mozilla | firefox | 2.0.0.11 | |
| mozilla | firefox | 2.0.0.12 | |
| mozilla | firefox | 2.0.0.13 | |
| mozilla | firefox | 2.0.0.14 | |
| mozilla | firefox | 2.0.0.15 | |
| mozilla | firefox | 2.0.0.16 | |
| mozilla | firefox | 2.0.0.17 | |
| mozilla | firefox | 2.0.0.18 | |
| mozilla | firefox | 2.0.0.19 | |
| mozilla | firefox | 2.0.0.20 | |
| mozilla | firefox | 2.0.0.21 | |
| mozilla | firefox | 2.0_.1 | |
| mozilla | firefox | 2.0_.4 | |
| mozilla | firefox | 2.0_.5 | |
| mozilla | firefox | 2.0_.6 | |
| mozilla | firefox | 2.0_.7 | |
| mozilla | firefox | 2.0_.9 | |
| mozilla | firefox | 2.0_.10 | |
| mozilla | firefox | 2.0_8 | |
| mozilla | firefox | 3.0 | |
| mozilla | firefox | 3.0 | |
| mozilla | firefox | 3.0 | |
| mozilla | firefox | 3.0 | |
| mozilla | firefox | 3.0.1 | |
| mozilla | firefox | 3.0.2 | |
| mozilla | firefox | 3.0.3 | |
| mozilla | firefox | 3.0.4 | |
| mozilla | firefox | 3.0.5 | |
| mozilla | firefox | 3.0.6 | |
| mozilla | firefox | 3.0.7 | |
| mozilla | firefox | 3.0.8 | |
| mozilla | firefox | 3.0.9 | |
| mozilla | firefox | 3.0beta5 | |
| mozilla | seamonkey | * | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0.1 | |
| mozilla | seamonkey | 1.0.3 | |
| mozilla | seamonkey | 1.0.4 | |
| mozilla | seamonkey | 1.0.6 | |
| mozilla | seamonkey | 1.0.8 | |
| mozilla | seamonkey | 1.0.9 | |
| mozilla | seamonkey | 1.0.99 | |
| mozilla | seamonkey | 1.1 | |
| mozilla | seamonkey | 1.1 | |
| mozilla | seamonkey | 1.1 | |
| mozilla | seamonkey | 1.1.1 | |
| mozilla | seamonkey | 1.1.3 | |
| mozilla | seamonkey | 1.1.5 | |
| mozilla | seamonkey | 1.1.5 | |
| mozilla | seamonkey | 1.1.6 | |
| mozilla | seamonkey | 1.1.7 | |
| mozilla | seamonkey | 1.1.8 | |
| mozilla | seamonkey | 1.1.9 | |
| mozilla | seamonkey | 1.1.10 | |
| mozilla | seamonkey | 1.1.11 | |
| mozilla | seamonkey | 1.1.12 | |
| mozilla | seamonkey | 1.1.13 | |
| mozilla | seamonkey | 1.1.15 | |
| mozilla | thunderbird | * | |
| mozilla | thunderbird | 0.1 | |
| mozilla | thunderbird | 0.2 | |
| mozilla | thunderbird | 0.3 | |
| mozilla | thunderbird | 0.4 | |
| mozilla | thunderbird | 0.5 | |
| mozilla | thunderbird | 0.6 | |
| mozilla | thunderbird | 0.7 | |
| mozilla | thunderbird | 0.7.1 | |
| mozilla | thunderbird | 0.7.2 | |
| mozilla | thunderbird | 0.7.3 | |
| mozilla | thunderbird | 0.8 | |
| mozilla | thunderbird | 0.9 | |
| mozilla | thunderbird | 1.0 | |
| mozilla | thunderbird | 1.0.1 | |
| mozilla | thunderbird | 1.0.2 | |
| mozilla | thunderbird | 1.0.3 | |
| mozilla | thunderbird | 1.0.4 | |
| mozilla | thunderbird | 1.0.5 | |
| mozilla | thunderbird | 1.0.5 | |
| mozilla | thunderbird | 1.0.6 | |
| mozilla | thunderbird | 1.0.7 | |
| mozilla | thunderbird | 1.0.8 | |
| mozilla | thunderbird | 1.5 | |
| mozilla | thunderbird | 1.5 | |
| mozilla | thunderbird | 1.5.0.1 | |
| mozilla | thunderbird | 1.5.0.2 | |
| mozilla | thunderbird | 1.5.0.3 | |
| mozilla | thunderbird | 1.5.0.4 | |
| mozilla | thunderbird | 1.5.0.5 | |
| mozilla | thunderbird | 1.5.0.6 | |
| mozilla | thunderbird | 1.5.0.7 | |
| mozilla | thunderbird | 1.5.0.8 | |
| mozilla | thunderbird | 1.5.0.9 | |
| mozilla | thunderbird | 1.5.0.10 | |
| mozilla | thunderbird | 1.5.0.11 | |
| mozilla | thunderbird | 1.5.0.12 | |
| mozilla | thunderbird | 1.5.0.13 | |
| mozilla | thunderbird | 1.5.0.14 | |
| mozilla | thunderbird | 1.5.1 | |
| mozilla | thunderbird | 1.5.2 | |
| mozilla | thunderbird | 1.7.1 | |
| mozilla | thunderbird | 1.7.3 | |
| mozilla | thunderbird | 2.0.0.0 | |
| mozilla | thunderbird | 2.0.0.1 | |
| mozilla | thunderbird | 2.0.0.2 | |
| mozilla | thunderbird | 2.0.0.3 | |
| mozilla | thunderbird | 2.0.0.4 | |
| mozilla | thunderbird | 2.0.0.5 | |
| mozilla | thunderbird | 2.0.0.6 | |
| mozilla | thunderbird | 2.0.0.7 | |
| mozilla | thunderbird | 2.0.0.8 | |
| mozilla | thunderbird | 2.0.0.9 | |
| mozilla | thunderbird | 2.0.0.11 | |
| mozilla | thunderbird | 2.0.0.12 | |
| mozilla | thunderbird | 2.0.0.13 | |
| mozilla | thunderbird | 2.0.0.14 | |
| mozilla | thunderbird | 2.0.0.15 | |
| mozilla | thunderbird | 2.0.0.16 | |
| mozilla | thunderbird | 2.0.0.17 | |
| mozilla | thunderbird | 2.0.0.18 | |
| mozilla | thunderbird | 2.0_.4 | |
| mozilla | thunderbird | 2.0_.5 | |
| mozilla | thunderbird | 2.0_.6 | |
| mozilla | thunderbird | 2.0_.9 | |
| mozilla | thunderbird | 2.0_.12 | |
| mozilla | thunderbird | 2.0_.13 | |
| mozilla | thunderbird | 2.0_.14 | |
| mozilla | thunderbird | 2.0_8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E05337C3-04A1-4403-84BE-78FCDF83448D",
"versionEndIncluding": "3.0.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7AA88B-638A-451A-B235-A1A1444BE417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C01AD7C-8470-47AB-B8AE-670E3A381E89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7E43F2F1-9252-4B44-8A61-D05305915A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB9D48B-DC7B-4D92-BB26-B6DE629A2506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A360D595-A829-4DDE-932E-9995626917E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E9B5349-FAA7-4CDA-9533-1AD1ACDFAC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "07243837-C353-4C25-A5B1-4DA32807E97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B832C034-F793-415F-BFC8-D97A18BA6BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83CD1A13-66CB-49CC-BD84-5D8334DB774A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "93C142C5-3A85-432B-80D6-2E7B1B4694F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2434FCE7-A50B-4527-9970-C7224B31141C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"matchCriteriaId": "5633FB6E-D623-49D4-9858-4E20E64DE458",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "429ECA02-DBCD-45FB-942C-CA4BC1BC8A72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "567FF916-7DE0-403C-8528-7931A43E0D18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*",
"matchCriteriaId": "E15536D0-B6A3-4106-8196-021724324CAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "010B34F4-910E-4515-990B-8E72DF009578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"matchCriteriaId": "438AACF8-006F-4522-853F-30DBBABD8C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "778FAE0C-A5CF-4B67-93A9-1A803E3E699F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7447185-7509-449D-8907-F30A42CF7EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDBAC37-9D08-44D1-B279-BC6ACF126CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3FFF89FA-2020-43CC-BACD-D66117B3DD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "834BB391-5EB5-43A8-980A-D305EDAE6FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9A38AD88-BAA6-4FBE-885B-69E951BD1EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*",
"matchCriteriaId": "659F5DAF-D54F-43FB-AB2A-3FC7D456B434",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B500EE6C-99DB-49A3-A1F1-AFFD7FE28068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2938F2-A801-45E5-8E06-BE03DE03C8A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F18A45C0-419C-4723-AB7D-5880EF668CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB88E86-6E83-4A59-9266-8B98AA91774D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"matchCriteriaId": "66BE50FE-EA21-4633-A181-CD35196DF06E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6BF5B1-86D1-47FE-9D9C-735718F94874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "84D15CE0-69DF-4EFD-801E-96A4D6AABEDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F38886-C25A-4C6B-93E7-36461405BA99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C65D2670-F37F-48CB-804A-D35BB1C27D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8E5194-7B34-4802-BDA6-6A86EB5EDE05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2917BD67-CE81-4B94-B241-D4A9DDA60319",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A524A94E-F19B-42B9-AA8E-171751C339AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F71436CF-F756-44E0-8E69-6951F6B3E54A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "582EE839-B83F-4908-9780-D0C92DC44FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "824369CF-00A0-434E-94BC-71CA1317012C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB35099-B04E-4796-A25D-953329FE62F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C30ACBCA-4FA1-46DE-8F15-4830BC27E160",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9453EF65-7C69-449E-BF7C-4FECFB56713E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA75825-21CF-475B-8040-126A13FA2216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CA97C80E-17FA-4866-86CE-29886145ED80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE24BED-202E-416D-B5F2-8207D97B9939",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "04198E04-CE1D-4A5A-A20C-D1E135B45F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "717DB967-F658-4699-A224-5B261BFEC10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3487FA64-BE04-42CA-861E-3DAC097D7D32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"matchCriteriaId": "F61EA4A1-1916-48A5-8196-E3CDEF3108F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "A956C036-1E47-49B2-A971-69868A510B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F5AA254D-D41E-464F-9E2A-A950F08C6946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B05D2655-6641-42BE-9793-30005AC9D40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D956DC-C73B-439F-8D79-8239207CC76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "57E2C7E7-56C0-466C-BB08-5EB43922C4F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "462E135A-5616-46CC-A9C0-5A7A0526ACC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6121F9C1-F4DF-4AAB-9E51-AC1592AA5639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "58D44634-A0B5-4F05-8983-B08D392EC742",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4105171B-9C90-4ABF-B220-A35E7BA9EE40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "20985549-DB24-4B69-9D40-208A47AE658E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "43A13026-416F-4308-8A1B-E989BD769E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "612B015E-9F96-4CE6-83E4-23848FD609E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1E391619-0967-43E1-8CBC-4D54F72A85C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0544D626-E269-4677-9B05-7DAB23BD103B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C95F7B2C-80FC-4DF2-9680-F74634DCE3E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "863C140E-DC15-4A88-AB8A-8AEF9F4B8164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "38CD049A-5333-4FF7-AD34-6B74E19BADCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0066576D-D66A-4B59-B5C3-471EEBEE8B9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "60ED6DAA-9194-4829-BC1A-00F04BE7930A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "13BEB9A6-EFD5-4793-9603-84DB84F1CF7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "461163C6-4CA8-4BA9-95A1-136E612CBA6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "275E9D96-1290-44AB-BF9B-E9E4A803F593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "140EFF03-09CB-436E-AF3F-1CEEFF4D3F1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*",
"matchCriteriaId": "23D609B2-F66C-40F1-B7D9-965189F875A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*",
"matchCriteriaId": "327D8879-0B61-4681-886D-C53BE251E0ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59017F18-6C4E-4803-8A65-DB2A849C3197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BF006282-943B-4885-B523-6E575D664059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*",
"matchCriteriaId": "26356AB4-1C06-4E16-BAC1-B6A41626A222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC11707-DF87-4046-964D-40CF22385A48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F73F1171-E34D-4AC0-BF8B-3DB38AA13EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*",
"matchCriteriaId": "0422C796-ECC4-42C1-9580-1CE22A096244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "412DF091-7604-4110-87A0-3488116A97E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "7A1DE6AC-C6AA-4B27-AC21-3293E5357A7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "13AAF607-AEEE-4FAF-BE63-73B1D951EF52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "20139741-10B1-4E4B-8D5F-A715042049C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11E07FED-ABDB-4B0A-AB2E-4CBF1EAC4301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6558F1-9E0D-4107-909A-8EF4BC8A9C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "63DF3D65-C992-44CF-89B4-893526C6242E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9024117-2E8B-4240-9E21-CC501F3879B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "52624B41-AB34-40AD-8709-D9646B618AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "917E9856-9556-4FD6-A834-858F8837A6B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "98BBD74D-930C-4D80-A91B-0D61347BAA63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF2E696-883D-4DE5-8B79-D8E5D9470253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0beta5:*:*:*:*:*:*:*",
"matchCriteriaId": "880CAA7D-398A-4B26-9754-FD188CE9729D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE872814-DA94-417A-99E4-0E01E4554E74",
"versionEndIncluding": "1.1.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E18FC0-0C8C-4FA1-85B9-B868D00F002F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*",
"matchCriteriaId": "D62F740C-706B-4290-AD92-3ECBC3D30768",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:beta:*:*:*:*:*",
"matchCriteriaId": "30B95DB4-EC98-4046-A894-26CA0807456B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*",
"matchCriteriaId": "55344F76-1C42-4DD8-A28B-1C33626C6FD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "4A97B6E1-EABA-4977-A3FC-64DF0392AA95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "CB01A97F-ACE1-4A99-8939-6DF8FE5B5E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6521C877-63C9-4B6E-9FC9-1263FFBB7950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C5CDA57-1A50-4EDB-80E2-D3EBB44EA653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "22D33486-4956-4E2C-BA16-FA269A9D02BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "381313EF-DF84-4F66-9962-DE8F45029D79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A803A500-DCE2-44FC-ABEB-A90A1D39D85C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "022274DE-5251-49C9-B6E5-1D8CEDC34E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "E1E99882-786F-455F-BAC4-30716120964A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9F84CB7-93F7-4912-BC87-497867B96491",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"matchCriteriaId": "8992E9C6-09B3-492E-B7DA-899D5238EC18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "D58B704B-F06E-44C1-BBD1-A090D1E6583A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "40270FBD-744A-49D9-9FFA-1DCD897210D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7F65732F-317B-49A2-B9B0-FA1102B8B45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "76AD0439-3BFB-4AD1-8E2C-99D0B099FA8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.5:1.1.10:*:*:*:*:*:*",
"matchCriteriaId": "E34A3468-C3BF-417B-85FB-18C28F0765B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1E6D7528-E591-48A6-8165-BE42F8EBF6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA710423-0075-44B8-9DCB-6380FA974486",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C5521DA3-E6AF-4350-B971-10B4A1C9B1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD15752-A253-47B1-BCE0-B55B84B47C9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "60B39A9D-44A4-4D7F-9004-C44066BBE277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F203EC52-2126-4227-AF3B-23857E5BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E951567B-8402-42EA-AE33-EBA9235A868F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "82A94198-7EBF-4D8A-A99A-A32A8561FF2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "83EED5D2-EC40-4253-991B-0C746FBEF6A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "850345D6-2085-4EC4-AE47-FC8E265C61D4",
"versionEndIncluding": "2.0.0.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0618BD26-0EF5-4774-9131-B5ABD4CD302A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0D604DAE-DF63-413C-9F49-FFC8E84699F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11DE6185-09F4-48E3-9742-F9D8030B5774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B2E70864-E077-4CD6-A0E8-BC2C4C298A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61E565E5-286D-4A68-B085-5659DFE59A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2A68B4-9101-4AC5-9E82-EEB5A5405541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA6C390-9BA7-4355-8C0A-CD68FF6AC236",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C75B125-E5BB-49A0-B12D-6CF40D8A5DB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70DDB53E-7A12-4A08-8999-DB68E6DF901E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6514EDE8-7C78-4C72-A313-E0915D89E4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5263F879-9B90-4582-B677-F133DEBE5259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C256B73C-9ABC-43D4-8C57-09161BC9F923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "055D1044-9FC5-45AA-8407-649E96C5AFE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1C87A5-C14D-4A23-B865-3BB1FCDC8470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C4DB0BB-BFD7-4E7A-B3EF-9C5422602216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D56153-E20A-46D8-859E-A51E5C03D674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2C51A6F4-F88F-4BF2-BF71-5DC48559C085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC390CB-774C-47BE-95C3-059943A9E645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "379F6A73-B45F-4094-8167-4E929FFB1749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B71DE7AC-553B-4524-8B33-5605518449EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72B02389-0DCD-45BC-A09F-CB6B75940616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "41AE4644-2D23-43EA-ABDA-7BE60EFD1EFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4FB87608-0DF8-4729-95C5-CFA386AB3AC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"matchCriteriaId": "1A406214-29E5-4E13-B2E1-1CF72F1E60BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C169DA-26BC-42EE-817B-2F0685069495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C99BAF7-B48E-4402-B2BF-EB07235E402E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F0C73F-291F-4A92-87B8-2269B5C1516D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C86FD617-E4FE-4F85-AAA4-4F968A9DEC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "938B1260-74A7-4CFF-8086-415DCC284430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E28672BA-E3C2-40C3-80E1-95B7CDD089E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9308147C-0A23-48BC-BFA9-A49B9D73014E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E6654EC3-BED6-4D6D-9B7F-DF4CC8E464BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CAD8DCC-DBB4-40EE-927C-7B0969700077",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "77F9CE47-E3AA-49D7-AEC9-447951AC31E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "581615BB-C781-42CA-836E-0E0EAB8C4504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "257F43FA-D22C-4BF0-A02E-261A54142BCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8D63F5-78D5-4F7B-B15A-2C15FC405E27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "84BC6D68-4ED4-43CF-A2EB-47BD15D11AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D291234-D64A-4E8A-A7CD-08BB980E1CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB1FC6D1-8D93-4D87-9D73-7C6C0F8D45C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A3C27EC-5794-49C1-96E0-997E700B13DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC60781-766B-4B9C-B68D-45D51C5E5D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "745C2CBA-4824-441B-A6BC-E80959C2E035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C6A7D00-A203-4891-96CE-20C91FCBF048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8CB480-0595-4BC1-998E-3638E85DB367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC7EAB8D-CA40-4C29-99DF-24FF1753BCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9218A9-DA27-436A-AC93-F465FC14ECF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E66503D7-72CB-42A5-8C85-D9579EF2C0A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD7D204-3EBA-4D9E-B95A-86524B4C03D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBF526-7A28-436B-9B01-EADE913602B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B373B409-0939-4707-99F1-95B121BFF7FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "75A0BCE3-38E7-4318-9A7E-3D895171129A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E80CA1DE-B920-4E28-BEFC-574148D19A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2303104C-4A91-4704-A9CB-8C83A859090E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCDAA51-4AA3-4EC4-B441-71FB3C3304F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "04CA7AD2-79BA-4A73-ADAB-E3BCA3FD7F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D54ACD07-FAB7-4513-A707-18FAF7D565C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "7260CE1F-501D-44FF-A3FA-2137CA01733B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "55D3DD1B-64DF-46C8-80A3-99D2E34B665F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.4:*:*:*:*:*:*:*",
"matchCriteriaId": "63AF48A9-C161-4603-82F0-5D2DE1EBA498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.5:*:*:*:*:*:*:*",
"matchCriteriaId": "821E46E8-B084-4762-86F0-002CA288B522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A084C258-7D78-4F6D-8E24-00BE9608EBFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.9:*:*:*:*:*:*:*",
"matchCriteriaId": "893FD2C8-C8EF-4ED3-9B7C-82D8DA9A1C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FEA455-E605-4CE3-A951-760D59091C56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F1758117-4865-42A4-8110-2250924E21FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_.14:*:*:*:*:*:*:*",
"matchCriteriaId": "81AF4BFB-EC89-454B-89DF-FC8F6102E28C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0_8:*:*:*:*:*:*:*",
"matchCriteriaId": "8013986B-DCAF-44A1-BA63-5BBA6762720F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an \"SSL tampering\" attack."
},
{
"lang": "es",
"value": "Mozilla Firefox anteriores a v3.0.11, Thunderbird anteriores a v2.0.0.22, y SeaMonkey anteriores a v1.1.17 utilizan la cabecera HTTP del servidor para determinar el contexto de un documento facilitado mediante una respuesta CONNECT no 200 desde un servidor proxy, lo que permite a atacantes \"man-in-the-middle\" ejecutar secuencias de comandos web arbitrarios mediante la modificaci\u00f3n de la respuesta CONNECT, tambi\u00e9n conocido como ataque \"forzado SSL\"."
}
],
"id": "CVE-2009-1836",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-06-12T21:30:00.327",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://osvdb.org/55160"
},
{
"source": "secalert@redhat.com",
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
},
{
"source": "secalert@redhat.com",
"url": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35331"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35415"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35431"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35439"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35440"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35468"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35536"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35561"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35602"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35882"
},
{
"source": "secalert@redhat.com",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.372468"
},
{
"source": "secalert@redhat.com",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.425408"
},
{
"source": "secalert@redhat.com",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2009/dsa-1820"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2009/dsa-1830"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:141"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1126.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/35326"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/35380"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1022396"
},
{
"source": "secalert@redhat.com",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.454275"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-782-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1572"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503578"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1095.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/55160"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35431"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35439"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35468"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35536"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35602"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35882"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.372468"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.425408"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1820"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1830"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:141"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-27.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1126.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/35326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/35380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022396"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.454275"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-782-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1572"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=479880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503578"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1095.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.