Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-0472 (GCVE-0-2012-0472)
Vulnerability from cvelistv5 – Published: 2012-04-25 10:00 – Updated: 2024-08-06 18:23- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:23:31.010Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "53218",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/53218"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"name": "oval:org.mitre.oval:def:17067",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17067"
},
{
"name": "49055",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49055"
},
{
"name": "MDVSA-2012:081",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "48972",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48972"
},
{
"name": "MDVSA-2012:066",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-28T20:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "53218",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/53218"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"name": "oval:org.mitre.oval:def:17067",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17067"
},
{
"name": "49055",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49055"
},
{
"name": "MDVSA-2012:081",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "48972",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48972"
},
{
"name": "MDVSA-2012:066",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-0472",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "53218",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53218"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"name": "oval:org.mitre.oval:def:17067",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17067"
},
{
"name": "49055",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49055"
},
{
"name": "MDVSA-2012:081",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "48972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48972"
},
{
"name": "MDVSA-2012:066",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-0472",
"datePublished": "2012-04-25T10:00:00.000Z",
"dateReserved": "2012-01-09T00:00:00.000Z",
"dateUpdated": "2024-08-06T18:23:31.010Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-555H-VJ7W-V68W
Vulnerability from github – Published: 2022-05-04 00:30 – Updated: 2022-05-04 00:30The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
{
"affected": [],
"aliases": [
"CVE-2012-0472"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-04-25T10:10:00Z",
"severity": "HIGH"
},
"details": "The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.",
"id": "GHSA-555h-vj7w-v68w",
"modified": "2022-05-04T00:30:35Z",
"published": "2022-05-04T00:30:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0472"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17067"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48972"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/49055"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/53218"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2012-0472
Vulnerability from fkie_nvd - Published: 2012-04-25 10:10 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C69962C4-FA56-47F2-82A4-DFF4C19DAF3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "B7BC1684-3634-4585-B7E6-8C8777E1DA0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"matchCriteriaId": "A490D040-EF74-45C2-89ED-D88ADD222712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"matchCriteriaId": "6CDA17D1-CD93-401E-860C-7C3291FEEB7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"matchCriteriaId": "6F72FDE3-54E0-48E4-9015-1B8A36DB1EC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "4062C901-3828-415B-A6C3-EDD0E7B20C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CC0D8730-7034-4AD6-9B05-F8BAFB0145EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "857AFB05-F0C1-4061-9680-9561D68C908F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "EC37EBAF-C979-4ACC-ACA9-BDC2AECCB0D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "80801CD8-EEAF-4BC4-9085-DCCC6CF73076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "FAF4C78A-5093-4871-AF69-A8E8FD7E1AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "560AD4C7-89D2-4323-BBCC-A89EEB6832CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"matchCriteriaId": "6B389CBC-4F6C-4C17-A87B-A6DD92703A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFBA043-91BC-4FB5-A34D-FCE1A9C65A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8901A808-66F1-4501-AFF6-6FBB22852855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F42315C-35AF-4EDD-8B78-A9EDB9F85D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62147F86-C2E6-4D55-9C72-F8BB430F2F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4D1FFD-3AFE-4F52-BCBE-A56609B2D7EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B2CD349-B9BF-4752-B7B9-665BF718EDB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11A8F675-A91F-4E41-AA2B-5214DF79C69C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "75B6A811-2B5A-484A-9878-C8E2C3E7633C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "456769EF-8961-4038-A7D5-B980147159E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7439C998-E396-4EEC-9C21-E82D27459EA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1CD246C-1104-4DA1-9BFD-ED0B1FBA7EF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEA6800-CBDB-497A-BBBE-1C40E8484A89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B82F27E4-BF6A-4F26-B50A-E4C0C19195B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "158215B1-22D3-4441-8F48-CAC048C2FF61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "28596BA2-CEBB-466F-AF7B-C47E92450672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EABF0A0D-8B5A-421A-87E5-67A226736775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "68E31768-892B-42DA-B81A-C14C95C3F26C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE719B1-2C70-4781-BEB1-58D1D414905F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A5BE5DD-4FC8-497A-AED3-3354C09CA71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1CCE074F-58FE-4B1B-849D-879825D96767",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD390621-599E-4B61-B51E-454AE6EC1A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89FA8D98-6B0B-44C0-8B7C-A1DE70213E2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE5FFDE-5C48-41B3-A143-D9FFAB05E385",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8CFA5B3D-D696-4BF4-9DB7-FBD703851D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "80B2A29B-B05D-43C3-AB1C-EDDF0EE80BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D53417-33FC-4AE6-8B12-6D241643CD97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "369438BA-3E3E-4F4A-9D55-37201BCC19EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C6BE133-ED60-489A-9EA4-239FFFAD13A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "772CC146-E2FA-4E18-AAAB-1D04D8572DB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7EAFAA60-E23E-4BAD-ACE6-17E760F03FDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9BD8FF90-E66B-4D22-A5E1-558D6384D152",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*",
"matchCriteriaId": "A615ECCB-672A-4B8E-83B9-456B5C77FE4C",
"versionEndIncluding": "2.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E18FC0-0C8C-4FA1-85B9-B868D00F002F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "4A97B6E1-EABA-4977-A3FC-64DF0392AA95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "CB01A97F-ACE1-4A99-8939-6DF8FE5B5E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6521C877-63C9-4B6E-9FC9-1263FFBB7950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D949DF0A-CBC2-40E1-AE6C-60E6F58D2481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C5CDA57-1A50-4EDB-80E2-D3EBB44EA653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "22D33486-4956-4E2C-BA16-FA269A9D02BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3104343E-93B6-4D4A-BC95-ED9F7E91FB6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "381313EF-DF84-4F66-9962-DE8F45029D79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A0228476-14E4-443C-BBAE-2C9CD8594DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A803A500-DCE2-44FC-ABEB-A90A1D39D85C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "022274DE-5251-49C9-B6E5-1D8CEDC34E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9F84CB7-93F7-4912-BC87-497867B96491",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"matchCriteriaId": "8992E9C6-09B3-492E-B7DA-899D5238EC18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "D58B704B-F06E-44C1-BBD1-A090D1E6583A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "40270FBD-744A-49D9-9FFA-1DCD897210D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "20E01097-F60A-4FB2-BA47-84A267EE87D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7F65732F-317B-49A2-B9B0-FA1102B8B45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DB430F19-069A-43FD-9097-586D4449D327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "76AD0439-3BFB-4AD1-8E2C-99D0B099FA8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1E6D7528-E591-48A6-8165-BE42F8EBF6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA710423-0075-44B8-9DCB-6380FA974486",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C5521DA3-E6AF-4350-B971-10B4A1C9B1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD15752-A253-47B1-BCE0-B55B84B47C9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "60B39A9D-44A4-4D7F-9004-C44066BBE277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F203EC52-2126-4227-AF3B-23857E5BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E951567B-8402-42EA-AE33-EBA9235A868F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "82A94198-7EBF-4D8A-A99A-A32A8561FF2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1BFFBC58-ACD2-449D-B010-5026D6022F86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "83EED5D2-EC40-4253-991B-0C746FBEF6A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0F73092C-1458-4278-A30D-C0F89B1F82F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB559BD-4BF7-417F-962F-B8971FF1614B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "7B528A25-003F-4614-B55B-AF46B66EDB44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "0078D890-6456-4F45-A3AE-B1A2BFAC6A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "69DD17EC-99EB-46C1-98E9-16A2EDB8E224",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F35F7EA1-8C98-4A3E-8767-89DBC26A32B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EF89719E-C415-45A3-A1CC-FAFDFCAE3055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58EB8E8A-84DE-43AA-B8F0-B585FB73D724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"matchCriteriaId": "C19C0BF7-390D-4E2E-BA32-28DFF73C55F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"matchCriteriaId": "5FE5E50C-80ED-4CA7-BC85-8BD2E324D527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"matchCriteriaId": "FEBF912C-A12E-4DBD-84AC-8B440E190BCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"matchCriteriaId": "9B8EDED6-29EF-4A9F-955D-F5E6611C2141",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "EDC9C82D-586A-48F4-B540-1E2AE79806B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "51FCF83B-630A-4413-BFAA-0C24A6B8F4F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "84B2AA0A-0220-49DD-82CD-37FDC563F146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D754AF10-1E43-46C8-A444-E7DB3401509D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "34182167-F1DF-455B-BFDB-0A8491590479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8ECA6CE-20D0-4A4F-B376-888A9328B044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEFCAB0-E57A-46E8-94C7-8510BB87C6B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FB5C972-AF7B-4EC7-BCE5-867CACCF5C19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C68DBB31-7804-446E-9A53-073E4B74E851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31ADCC51-CE05-4EB6-BE8F-B64FD62946A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "387390AE-CF25-47ED-BD36-F42455DE1A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "78D5F0AD-9974-40A1-942F-0F03A278DAD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2C388E6F-148E-4EA5-8D82-7778398122BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1F1FEB21-60B1-4303-BE19-576CC93B940C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "37F07875-FB5E-4B13-9798-BF9AEBD8A2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "87FD9961-DA1C-4846-A779-A836C07B98A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A40438F-0CF1-4A3E-BAC7-199D72901B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20EB46CA-D5DD-4FA8-A234-21C938620F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "635FCE4C-2D15-4FB2-8917-D176B1539024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "E59E74C2-38F2-4B7F-88C0-9919548713B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "DB6663ED-4643-4BB7-B281-706C7A0E10F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E7E8003B-C319-4AD0-9D32-DA05346869C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E60060B4-2301-497E-B03B-3DF3FBF159AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"matchCriteriaId": "4983E235-19E8-4315-977B-E74CD0BD5F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5C0D4ECE-209E-4919-B31C-D8BCCEABC759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B02ED302-0410-4F21-99C5-613DF719E7E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "07C298DB-767F-4703-B2DD-6499A11CEC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"matchCriteriaId": "46A3F5F4-CD81-4970-9A1B-38CC0308D450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"matchCriteriaId": "799A7D47-5A5B-4B4A-A462-8A488E04F5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*",
"matchCriteriaId": "EB80610A-8A8A-4383-817D-9179D755165C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BDEF27E-28F1-4F4F-8E0A-045DDD12C984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"matchCriteriaId": "43FC803B-C653-49C5-9412-7B128697F41B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"matchCriteriaId": "515BD552-738E-4D23-B040-2690F81CC8AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"matchCriteriaId": "8116FBF8-8BFA-4B23-805F-5A2A4EF1D1C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "244E732B-CA8D-4A3C-9657-50C0A7F57846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56D1B7-D582-4FB3-B85D-AFD56DBE3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02449F70-53DA-494A-A287-D12A96B35005",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "110E8C15-84FE-4A28-9538-7A7E8BC47F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"matchCriteriaId": "CD179C16-CDA6-4614-96FE-C4CAF9DB5D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"matchCriteriaId": "C8CF55C9-50EC-40CA-BBED-F24479A368BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C05D23FA-DC1F-49C7-8D27-E87DBE54E815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87E92301-D350-4241-9DDE-7402392ACDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1D02EDB8-717F-487C-81D1-754AA0C07A66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"matchCriteriaId": "89C54670-6E2D-4D43-A46C-23DA021A71A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"matchCriteriaId": "C792E8F2-411D-46C5-B800-D2749AC6865D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C564D4CD-FC0A-4488-8D5C-25BCCCF1982D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"matchCriteriaId": "CD4C2E80-2E5A-4F02-A491-8D9C71CB7F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "22584775-39EC-49B1-A451-3665AB580DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9A283292-A32D-4F21-BEA6-3B11001CDCBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"matchCriteriaId": "823CF58E-E8CB-46C0-A5BC-A6AC3FA9463B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"matchCriteriaId": "B6E9F40E-B865-4AFE-9E12-68E7DCA3D4E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"matchCriteriaId": "FA24FF47-60A9-499F-A19A-B37BEB621104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "43461096-9495-4A87-8F08-8592BC9BC336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EB949258-274B-46CE-BA9F-1B63F6E242C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E679A629-D0EF-492C-AD9F-B7EE3F7ABFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"matchCriteriaId": "5CB3FFED-F4D8-4E6D-B520-13B9B10BBAF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"matchCriteriaId": "03030B88-1B79-49E8-A417-E64A5345FDD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*",
"matchCriteriaId": "DB4E52BE-928D-4110-865D-ECA67FA2C3F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*",
"matchCriteriaId": "9C43FA6A-E002-4B3E-A23A-35E6D8F216E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38264FA7-28B8-465A-A3AB-07B74477DD8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE61906-F2EA-492D-A22C-935DA1F3E6BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "83113578-155E-4D55-BA88-75D7F2BA86CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*",
"matchCriteriaId": "A2D54DA0-1F70-43CD-B8A4-3E526D2BC3E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*",
"matchCriteriaId": "B49B1A62-5CA6-473B-886B-A3E1D44C7FFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DA112863-42AC-48E7-9889-33AE94E92705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*",
"matchCriteriaId": "0488EDAD-667E-45C9-AFC3-7146A68B4FF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*",
"matchCriteriaId": "A732B3B1-C1F0-44D1-BA77-2FCDE70C5008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*",
"matchCriteriaId": "A35415FA-8B86-4ABA-8B65-7C714B98BF44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*",
"matchCriteriaId": "50A169FF-51AF-40EB-9A9F-CB55F0FD9BED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*",
"matchCriteriaId": "ADB90839-EB91-4744-B80B-43C363DD801E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "La implementaci\u00f3n de cairo-dwrite en Mozilla Firefox v4.x hasta v11.0, Firefox ESR v10.x antes de v10.0.4, Thunderbird v5.0 hasta v11.0, Thunderbird ESR v10.x antes de v10.0.4, y SeaMonkey antes de v2.9 cuando se usan algunas configuraciones de Windows Vista y Windows 7, no restringe adecuadamente los intentos de renderizado de fuente, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2012-0472",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-04-25T10:10:17.557",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"Permissions Required"
],
"url": "http://secunia.com/advisories/48972"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"Permissions Required"
],
"url": "http://secunia.com/advisories/49055"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/53218"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17067"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Permissions Required"
],
"url": "http://secunia.com/advisories/48972"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Permissions Required"
],
"url": "http://secunia.com/advisories/49055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/53218"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17067"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTA-2012-AVI-234
Vulnerability from certfr_avis - Published: 2012-04-26 - Updated: 2012-04-26
Quatorze vulnérabilités ont été corrigées dans les produits Mozilla. La majorité permettent d'exécuter du code arbitraire à distance. Trois permettent de contourner des protections contre les attaques par « injection de code indirecte à distance » (XSS). Enfin, une vulnérabilité permet d'obtenir le nom de fichiers utilisés par l'application.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | versions antérieures à Thunderbird 12.0 ; | ||
| Mozilla | Firefox ESR | versions antérieures à Firefox ESR 10.0.4 ; | ||
| Mozilla | Thunderbird | versions antérieures à Thunderbird ESR 10.0.4 ; | ||
| Mozilla | N/A | versions antérieures à SeaMonkey 2.9. | ||
| Mozilla | Firefox | Versions antérieures à Firefox 12.0 ; |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "versions ant\u00e9rieures \u00e0 Thunderbird 12.0 ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "versions ant\u00e9rieures \u00e0 Firefox ESR 10.0.4 ;",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "versions ant\u00e9rieures \u00e0 Thunderbird ESR 10.0.4 ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "versions ant\u00e9rieures \u00e0 SeaMonkey 2.9.",
"product": {
"name": "N/A",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Versions ant\u00e9rieures \u00e0 Firefox 12.0 ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0474",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0474"
},
{
"name": "CVE-2012-0472",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0472"
},
{
"name": "CVE-2012-0470",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0470"
},
{
"name": "CVE-2011-3062",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3062"
},
{
"name": "CVE-2012-0475",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0475"
},
{
"name": "CVE-2012-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0467"
},
{
"name": "CVE-2012-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0469"
},
{
"name": "CVE-2012-0479",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0479"
},
{
"name": "CVE-2012-0477",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0477"
},
{
"name": "CVE-2012-0471",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0471"
},
{
"name": "CVE-2011-1187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1187"
},
{
"name": "CVE-2012-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0468"
},
{
"name": "CVE-2012-0478",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0478"
},
{
"name": "CVE-2012-0473",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0473"
}
],
"initial_release_date": "2012-04-26T00:00:00",
"last_revision_date": "2012-04-26T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-32 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-32.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-22 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-22.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-27 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-27.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-26 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-26.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-28 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-28.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-33 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-33.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-25 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-31 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-31.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-20 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-20.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-29 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-23 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-23.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-30 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-30.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-24 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-24.html"
}
],
"reference": "CERTA-2012-AVI-234",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Quatorze vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eMozilla\u003c/span\u003e. La majorit\u00e9 permettent d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance. Trois permettent de contourner des protections\ncontre les attaques par \u00ab injection de code indirecte \u00e0 distance \u00bb\n(XSS). Enfin, une vuln\u00e9rabilit\u00e9 permet d\u0027obtenir le nom de fichiers\nutilis\u00e9s par l\u0027application.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 MFSA2012 du 24 avril 2012",
"url": null
}
]
}
GSD-2012-0472
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-0472",
"description": "The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.",
"id": "GSD-2012-0472",
"references": [
"https://www.suse.com/security/cve/CVE-2012-0472.html",
"https://access.redhat.com/errata/RHSA-2012:0516",
"https://access.redhat.com/errata/RHSA-2012:0515",
"https://linux.oracle.com/cve/CVE-2012-0472.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-0472"
],
"details": "The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.",
"id": "GSD-2012-0472",
"modified": "2023-12-13T01:20:14.411424Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-0472",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "53218",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53218"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"name": "oval:org.mitre.oval:def:17067",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17067"
},
{
"name": "49055",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49055"
},
{
"name": "MDVSA-2012:081",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "48972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48972"
},
{
"name": "MDVSA-2012:066",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.9",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-0472"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744480"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"name": "53218",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/53218"
},
{
"name": "49055",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Permissions Required"
],
"url": "http://secunia.com/advisories/49055"
},
{
"name": "48972",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Permissions Required"
],
"url": "http://secunia.com/advisories/48972"
},
{
"name": "oval:org.mitre.oval:def:17067",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17067"
},
{
"name": "MDVSA-2012:081",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "MDVSA-2012:066",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-12-29T02:29Z",
"publishedDate": "2012-04-25T10:10Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.