Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-0477 (GCVE-0-2012-0477)
Vulnerability from cvelistv5 – Published: 2012-04-25 10:00 – Updated: 2024-08-06 18:23- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:23:31.102Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "48922",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48922"
},
{
"name": "oval:org.mitre.oval:def:16889",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
},
{
"name": "firefox-iso2022kr-xss(75154)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
},
{
"name": "53229",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/53229"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"name": "49055",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49055"
},
{
"name": "DSA-2458",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2458"
},
{
"name": "48920",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48920"
},
{
"name": "DSA-2457",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2457"
},
{
"name": "DSA-2464",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2464"
},
{
"name": "MDVSA-2012:081",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "48972",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48972"
},
{
"name": "MDVSA-2012:066",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"name": "49047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49047"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-01-17T19:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "48922",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48922"
},
{
"name": "oval:org.mitre.oval:def:16889",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
},
{
"name": "firefox-iso2022kr-xss(75154)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
},
{
"name": "53229",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/53229"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"name": "49055",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49055"
},
{
"name": "DSA-2458",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2458"
},
{
"name": "48920",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48920"
},
{
"name": "DSA-2457",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2457"
},
{
"name": "DSA-2464",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2464"
},
{
"name": "MDVSA-2012:081",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "48972",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48972"
},
{
"name": "MDVSA-2012:066",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"name": "49047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49047"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-0477",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "48922",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48922"
},
{
"name": "oval:org.mitre.oval:def:16889",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
},
{
"name": "firefox-iso2022kr-xss(75154)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
},
{
"name": "53229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53229"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"name": "49055",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49055"
},
{
"name": "DSA-2458",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2458"
},
{
"name": "48920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48920"
},
{
"name": "DSA-2457",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2457"
},
{
"name": "DSA-2464",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2464"
},
{
"name": "MDVSA-2012:081",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "48972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48972"
},
{
"name": "MDVSA-2012:066",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"name": "49047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49047"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-0477",
"datePublished": "2012-04-25T10:00:00.000Z",
"dateReserved": "2012-01-09T00:00:00.000Z",
"dateUpdated": "2024-08-06T18:23:31.102Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2012-0477
Vulnerability from fkie_nvd - Published: 2012-04-25 10:10 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://secunia.com/advisories/48920 | ||
| cve@mitre.org | http://secunia.com/advisories/48922 | ||
| cve@mitre.org | http://secunia.com/advisories/48972 | ||
| cve@mitre.org | http://secunia.com/advisories/49047 | ||
| cve@mitre.org | http://secunia.com/advisories/49055 | ||
| cve@mitre.org | http://www.debian.org/security/2012/dsa-2457 | ||
| cve@mitre.org | http://www.debian.org/security/2012/dsa-2458 | ||
| cve@mitre.org | http://www.debian.org/security/2012/dsa-2464 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2012:066 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2012:081 | ||
| cve@mitre.org | http://www.mozilla.org/security/announce/2012/mfsa2012-29.html | Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/53229 | ||
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=718573 | ||
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/75154 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48920 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48922 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48972 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49047 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49055 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2457 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2458 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2464 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2012:066 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2012:081 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mozilla.org/security/announce/2012/mfsa2012-29.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53229 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=718573 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75154 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889 |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0 | |
| mozilla | firefox | 4.0.1 | |
| mozilla | firefox | 5.0 | |
| mozilla | firefox | 5.0.1 | |
| mozilla | firefox | 6.0 | |
| mozilla | firefox | 6.0.1 | |
| mozilla | firefox | 6.0.2 | |
| mozilla | firefox | 7.0 | |
| mozilla | firefox | 7.0.1 | |
| mozilla | firefox | 8.0 | |
| mozilla | firefox | 8.0.1 | |
| mozilla | firefox | 9.0 | |
| mozilla | firefox | 9.0.1 | |
| mozilla | firefox | 10.0 | |
| mozilla | firefox | 10.0.1 | |
| mozilla | firefox | 10.0.2 | |
| mozilla | firefox | 11.0 | |
| mozilla | firefox | 10.0 | |
| mozilla | firefox | 10.0.1 | |
| mozilla | firefox | 10.0.2 | |
| mozilla | firefox | 10.0.3 | |
| mozilla | thunderbird | 5.0 | |
| mozilla | thunderbird | 6.0 | |
| mozilla | thunderbird | 6.0.1 | |
| mozilla | thunderbird | 6.0.2 | |
| mozilla | thunderbird | 7.0 | |
| mozilla | thunderbird | 7.0.1 | |
| mozilla | thunderbird | 8.0 | |
| mozilla | thunderbird | 9.0 | |
| mozilla | thunderbird | 9.0.1 | |
| mozilla | thunderbird | 10.0 | |
| mozilla | thunderbird | 10.0.1 | |
| mozilla | thunderbird | 10.0.2 | |
| mozilla | thunderbird | 10.0.3 | |
| mozilla | thunderbird | 10.0.4 | |
| mozilla | thunderbird | 11.0 | |
| mozilla | thunderbird_esr | 10.0 | |
| mozilla | thunderbird_esr | 10.0.1 | |
| mozilla | thunderbird_esr | 10.0.2 | |
| mozilla | thunderbird_esr | 10.0.3 | |
| mozilla | seamonkey | * | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0 | |
| mozilla | seamonkey | 1.0.1 | |
| mozilla | seamonkey | 1.0.2 | |
| mozilla | seamonkey | 1.0.3 | |
| mozilla | seamonkey | 1.0.4 | |
| mozilla | seamonkey | 1.0.5 | |
| mozilla | seamonkey | 1.0.6 | |
| mozilla | seamonkey | 1.0.7 | |
| mozilla | seamonkey | 1.0.8 | |
| mozilla | seamonkey | 1.0.9 | |
| mozilla | seamonkey | 1.1 | |
| mozilla | seamonkey | 1.1 | |
| mozilla | seamonkey | 1.1 | |
| mozilla | seamonkey | 1.1.1 | |
| mozilla | seamonkey | 1.1.2 | |
| mozilla | seamonkey | 1.1.3 | |
| mozilla | seamonkey | 1.1.4 | |
| mozilla | seamonkey | 1.1.5 | |
| mozilla | seamonkey | 1.1.6 | |
| mozilla | seamonkey | 1.1.7 | |
| mozilla | seamonkey | 1.1.8 | |
| mozilla | seamonkey | 1.1.9 | |
| mozilla | seamonkey | 1.1.10 | |
| mozilla | seamonkey | 1.1.11 | |
| mozilla | seamonkey | 1.1.12 | |
| mozilla | seamonkey | 1.1.13 | |
| mozilla | seamonkey | 1.1.14 | |
| mozilla | seamonkey | 1.1.15 | |
| mozilla | seamonkey | 1.1.16 | |
| mozilla | seamonkey | 1.1.17 | |
| mozilla | seamonkey | 1.1.18 | |
| mozilla | seamonkey | 1.1.19 | |
| mozilla | seamonkey | 1.5.0.8 | |
| mozilla | seamonkey | 1.5.0.9 | |
| mozilla | seamonkey | 1.5.0.10 | |
| mozilla | seamonkey | 2.0 | |
| mozilla | seamonkey | 2.0 | |
| mozilla | seamonkey | 2.0 | |
| mozilla | seamonkey | 2.0 | |
| mozilla | seamonkey | 2.0 | |
| mozilla | seamonkey | 2.0 | |
| mozilla | seamonkey | 2.0 | |
| mozilla | seamonkey | 2.0 | |
| mozilla | seamonkey | 2.0.1 | |
| mozilla | seamonkey | 2.0.2 | |
| mozilla | seamonkey | 2.0.3 | |
| mozilla | seamonkey | 2.0.4 | |
| mozilla | seamonkey | 2.0.5 | |
| mozilla | seamonkey | 2.0.6 | |
| mozilla | seamonkey | 2.0.7 | |
| mozilla | seamonkey | 2.0.8 | |
| mozilla | seamonkey | 2.0.9 | |
| mozilla | seamonkey | 2.0.10 | |
| mozilla | seamonkey | 2.0.11 | |
| mozilla | seamonkey | 2.0.12 | |
| mozilla | seamonkey | 2.0.13 | |
| mozilla | seamonkey | 2.0.14 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.1 | |
| mozilla | seamonkey | 2.2 | |
| mozilla | seamonkey | 2.2 | |
| mozilla | seamonkey | 2.2 | |
| mozilla | seamonkey | 2.2 | |
| mozilla | seamonkey | 2.3 | |
| mozilla | seamonkey | 2.3 | |
| mozilla | seamonkey | 2.3 | |
| mozilla | seamonkey | 2.3 | |
| mozilla | seamonkey | 2.3.1 | |
| mozilla | seamonkey | 2.3.2 | |
| mozilla | seamonkey | 2.3.3 | |
| mozilla | seamonkey | 2.4 | |
| mozilla | seamonkey | 2.4 | |
| mozilla | seamonkey | 2.4 | |
| mozilla | seamonkey | 2.4 | |
| mozilla | seamonkey | 2.4.1 | |
| mozilla | seamonkey | 2.5 | |
| mozilla | seamonkey | 2.5 | |
| mozilla | seamonkey | 2.5 | |
| mozilla | seamonkey | 2.5 | |
| mozilla | seamonkey | 2.5 | |
| mozilla | seamonkey | 2.6 | |
| mozilla | seamonkey | 2.6 | |
| mozilla | seamonkey | 2.6 | |
| mozilla | seamonkey | 2.6 | |
| mozilla | seamonkey | 2.6 | |
| mozilla | seamonkey | 2.6.1 | |
| mozilla | seamonkey | 2.7 | |
| mozilla | seamonkey | 2.7 | |
| mozilla | seamonkey | 2.7 | |
| mozilla | seamonkey | 2.7 | |
| mozilla | seamonkey | 2.7 | |
| mozilla | seamonkey | 2.7 | |
| mozilla | seamonkey | 2.7.1 | |
| mozilla | seamonkey | 2.7.2 | |
| mozilla | seamonkey | 2.8 | |
| mozilla | seamonkey | 2.8 | |
| mozilla | seamonkey | 2.8 | |
| mozilla | seamonkey | 2.8 | |
| mozilla | seamonkey | 2.8 | |
| mozilla | seamonkey | 2.8 | |
| mozilla | seamonkey | 2.8 | |
| mozilla | seamonkey | 2.9 | |
| mozilla | seamonkey | 2.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C69962C4-FA56-47F2-82A4-DFF4C19DAF3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "B7BC1684-3634-4585-B7E6-8C8777E1DA0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"matchCriteriaId": "A490D040-EF74-45C2-89ED-D88ADD222712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"matchCriteriaId": "6CDA17D1-CD93-401E-860C-7C3291FEEB7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"matchCriteriaId": "6F72FDE3-54E0-48E4-9015-1B8A36DB1EC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "4062C901-3828-415B-A6C3-EDD0E7B20C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "CC0D8730-7034-4AD6-9B05-F8BAFB0145EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "857AFB05-F0C1-4061-9680-9561D68C908F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "EC37EBAF-C979-4ACC-ACA9-BDC2AECCB0D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "80801CD8-EEAF-4BC4-9085-DCCC6CF73076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "FAF4C78A-5093-4871-AF69-A8E8FD7E1AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "560AD4C7-89D2-4323-BBCC-A89EEB6832CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"matchCriteriaId": "6B389CBC-4F6C-4C17-A87B-A6DD92703A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFBA043-91BC-4FB5-A34D-FCE1A9C65A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8901A808-66F1-4501-AFF6-6FBB22852855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B88D1373-6E41-4EF4-86A0-CE85EA3BF23E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F42315C-35AF-4EDD-8B78-A9EDB9F85D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62147F86-C2E6-4D55-9C72-F8BB430F2F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4D1FFD-3AFE-4F52-BCBE-A56609B2D7EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B2CD349-B9BF-4752-B7B9-665BF718EDB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11A8F675-A91F-4E41-AA2B-5214DF79C69C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "75B6A811-2B5A-484A-9878-C8E2C3E7633C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "456769EF-8961-4038-A7D5-B980147159E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7439C998-E396-4EEC-9C21-E82D27459EA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1CD246C-1104-4DA1-9BFD-ED0B1FBA7EF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEA6800-CBDB-497A-BBBE-1C40E8484A89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B82F27E4-BF6A-4F26-B50A-E4C0C19195B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "158215B1-22D3-4441-8F48-CAC048C2FF61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "28596BA2-CEBB-466F-AF7B-C47E92450672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EABF0A0D-8B5A-421A-87E5-67A226736775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "68E31768-892B-42DA-B81A-C14C95C3F26C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE719B1-2C70-4781-BEB1-58D1D414905F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A5BE5DD-4FC8-497A-AED3-3354C09CA71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1CCE074F-58FE-4B1B-849D-879825D96767",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "427DE88B-A729-43F8-B7FE-6DCDC91A7FA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD390621-599E-4B61-B51E-454AE6EC1A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89FA8D98-6B0B-44C0-8B7C-A1DE70213E2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE5FFDE-5C48-41B3-A143-D9FFAB05E385",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8CFA5B3D-D696-4BF4-9DB7-FBD703851D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "80B2A29B-B05D-43C3-AB1C-EDDF0EE80BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D53417-33FC-4AE6-8B12-6D241643CD97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "369438BA-3E3E-4F4A-9D55-37201BCC19EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C6BE133-ED60-489A-9EA4-239FFFAD13A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "772CC146-E2FA-4E18-AAAB-1D04D8572DB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7EAFAA60-E23E-4BAD-ACE6-17E760F03FDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*",
"matchCriteriaId": "A615ECCB-672A-4B8E-83B9-456B5C77FE4C",
"versionEndIncluding": "2.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E18FC0-0C8C-4FA1-85B9-B868D00F002F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "4A97B6E1-EABA-4977-A3FC-64DF0392AA95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "CB01A97F-ACE1-4A99-8939-6DF8FE5B5E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6521C877-63C9-4B6E-9FC9-1263FFBB7950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D949DF0A-CBC2-40E1-AE6C-60E6F58D2481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C5CDA57-1A50-4EDB-80E2-D3EBB44EA653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "22D33486-4956-4E2C-BA16-FA269A9D02BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3104343E-93B6-4D4A-BC95-ED9F7E91FB6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "381313EF-DF84-4F66-9962-DE8F45029D79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A0228476-14E4-443C-BBAE-2C9CD8594DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A803A500-DCE2-44FC-ABEB-A90A1D39D85C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "022274DE-5251-49C9-B6E5-1D8CEDC34E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9F84CB7-93F7-4912-BC87-497867B96491",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"matchCriteriaId": "8992E9C6-09B3-492E-B7DA-899D5238EC18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "D58B704B-F06E-44C1-BBD1-A090D1E6583A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "40270FBD-744A-49D9-9FFA-1DCD897210D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "20E01097-F60A-4FB2-BA47-84A267EE87D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7F65732F-317B-49A2-B9B0-FA1102B8B45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DB430F19-069A-43FD-9097-586D4449D327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "76AD0439-3BFB-4AD1-8E2C-99D0B099FA8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1E6D7528-E591-48A6-8165-BE42F8EBF6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA710423-0075-44B8-9DCB-6380FA974486",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C5521DA3-E6AF-4350-B971-10B4A1C9B1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD15752-A253-47B1-BCE0-B55B84B47C9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "60B39A9D-44A4-4D7F-9004-C44066BBE277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F203EC52-2126-4227-AF3B-23857E5BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E951567B-8402-42EA-AE33-EBA9235A868F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "82A94198-7EBF-4D8A-A99A-A32A8561FF2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1BFFBC58-ACD2-449D-B010-5026D6022F86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "83EED5D2-EC40-4253-991B-0C746FBEF6A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0F73092C-1458-4278-A30D-C0F89B1F82F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB559BD-4BF7-417F-962F-B8971FF1614B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "7B528A25-003F-4614-B55B-AF46B66EDB44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "0078D890-6456-4F45-A3AE-B1A2BFAC6A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "69DD17EC-99EB-46C1-98E9-16A2EDB8E224",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F35F7EA1-8C98-4A3E-8767-89DBC26A32B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EF89719E-C415-45A3-A1CC-FAFDFCAE3055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58EB8E8A-84DE-43AA-B8F0-B585FB73D724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"matchCriteriaId": "C19C0BF7-390D-4E2E-BA32-28DFF73C55F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"matchCriteriaId": "5FE5E50C-80ED-4CA7-BC85-8BD2E324D527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"matchCriteriaId": "FEBF912C-A12E-4DBD-84AC-8B440E190BCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"matchCriteriaId": "9B8EDED6-29EF-4A9F-955D-F5E6611C2141",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "EDC9C82D-586A-48F4-B540-1E2AE79806B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "51FCF83B-630A-4413-BFAA-0C24A6B8F4F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "84B2AA0A-0220-49DD-82CD-37FDC563F146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D754AF10-1E43-46C8-A444-E7DB3401509D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "34182167-F1DF-455B-BFDB-0A8491590479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8ECA6CE-20D0-4A4F-B376-888A9328B044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEFCAB0-E57A-46E8-94C7-8510BB87C6B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FB5C972-AF7B-4EC7-BCE5-867CACCF5C19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C68DBB31-7804-446E-9A53-073E4B74E851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31ADCC51-CE05-4EB6-BE8F-B64FD62946A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "387390AE-CF25-47ED-BD36-F42455DE1A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "78D5F0AD-9974-40A1-942F-0F03A278DAD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2C388E6F-148E-4EA5-8D82-7778398122BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1F1FEB21-60B1-4303-BE19-576CC93B940C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "37F07875-FB5E-4B13-9798-BF9AEBD8A2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "87FD9961-DA1C-4846-A779-A836C07B98A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A40438F-0CF1-4A3E-BAC7-199D72901B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20EB46CA-D5DD-4FA8-A234-21C938620F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "635FCE4C-2D15-4FB2-8917-D176B1539024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "E59E74C2-38F2-4B7F-88C0-9919548713B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "DB6663ED-4643-4BB7-B281-706C7A0E10F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E7E8003B-C319-4AD0-9D32-DA05346869C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E60060B4-2301-497E-B03B-3DF3FBF159AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"matchCriteriaId": "4983E235-19E8-4315-977B-E74CD0BD5F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5C0D4ECE-209E-4919-B31C-D8BCCEABC759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B02ED302-0410-4F21-99C5-613DF719E7E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "07C298DB-767F-4703-B2DD-6499A11CEC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"matchCriteriaId": "46A3F5F4-CD81-4970-9A1B-38CC0308D450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"matchCriteriaId": "799A7D47-5A5B-4B4A-A462-8A488E04F5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*",
"matchCriteriaId": "EB80610A-8A8A-4383-817D-9179D755165C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BDEF27E-28F1-4F4F-8E0A-045DDD12C984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"matchCriteriaId": "43FC803B-C653-49C5-9412-7B128697F41B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"matchCriteriaId": "515BD552-738E-4D23-B040-2690F81CC8AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"matchCriteriaId": "8116FBF8-8BFA-4B23-805F-5A2A4EF1D1C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "244E732B-CA8D-4A3C-9657-50C0A7F57846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56D1B7-D582-4FB3-B85D-AFD56DBE3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02449F70-53DA-494A-A287-D12A96B35005",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "110E8C15-84FE-4A28-9538-7A7E8BC47F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"matchCriteriaId": "CD179C16-CDA6-4614-96FE-C4CAF9DB5D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"matchCriteriaId": "C8CF55C9-50EC-40CA-BBED-F24479A368BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C05D23FA-DC1F-49C7-8D27-E87DBE54E815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87E92301-D350-4241-9DDE-7402392ACDFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1D02EDB8-717F-487C-81D1-754AA0C07A66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"matchCriteriaId": "89C54670-6E2D-4D43-A46C-23DA021A71A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"matchCriteriaId": "C792E8F2-411D-46C5-B800-D2749AC6865D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C564D4CD-FC0A-4488-8D5C-25BCCCF1982D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"matchCriteriaId": "CD4C2E80-2E5A-4F02-A491-8D9C71CB7F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "22584775-39EC-49B1-A451-3665AB580DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9A283292-A32D-4F21-BEA6-3B11001CDCBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"matchCriteriaId": "823CF58E-E8CB-46C0-A5BC-A6AC3FA9463B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"matchCriteriaId": "B6E9F40E-B865-4AFE-9E12-68E7DCA3D4E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"matchCriteriaId": "FA24FF47-60A9-499F-A19A-B37BEB621104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "43461096-9495-4A87-8F08-8592BC9BC336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EB949258-274B-46CE-BA9F-1B63F6E242C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E679A629-D0EF-492C-AD9F-B7EE3F7ABFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"matchCriteriaId": "5CB3FFED-F4D8-4E6D-B520-13B9B10BBAF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"matchCriteriaId": "03030B88-1B79-49E8-A417-E64A5345FDD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*",
"matchCriteriaId": "DB4E52BE-928D-4110-865D-ECA67FA2C3F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*",
"matchCriteriaId": "9C43FA6A-E002-4B3E-A23A-35E6D8F216E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38264FA7-28B8-465A-A3AB-07B74477DD8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE61906-F2EA-492D-A22C-935DA1F3E6BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "83113578-155E-4D55-BA88-75D7F2BA86CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*",
"matchCriteriaId": "A2D54DA0-1F70-43CD-B8A4-3E526D2BC3E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*",
"matchCriteriaId": "B49B1A62-5CA6-473B-886B-A3E1D44C7FFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*",
"matchCriteriaId": "DA112863-42AC-48E7-9889-33AE94E92705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*",
"matchCriteriaId": "0488EDAD-667E-45C9-AFC3-7146A68B4FF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*",
"matchCriteriaId": "A732B3B1-C1F0-44D1-BA77-2FCDE70C5008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*",
"matchCriteriaId": "A35415FA-8B86-4ABA-8B65-7C714B98BF44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*",
"matchCriteriaId": "50A169FF-51AF-40EB-9A9F-CB55F0FD9BED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*",
"matchCriteriaId": "ADB90839-EB91-4744-B80B-43C363DD801E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejcuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Mozilla Firefox v4.x hasta v11.0, Firefox ESR v10.x antes de v10.0.4, Thunderbird v5.0 hasta v11.0, Thunderbird ESR v10.x antes de v10.0.4, y SeaMonkey antes de v2.9 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de caracteres (1) ISO-2022-KR o (2) ISO-2022-CN"
}
],
"id": "CVE-2012-0477",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-04-25T10:10:17.713",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/48920"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/48922"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/48972"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/49047"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/49055"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2012/dsa-2457"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2012/dsa-2458"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2012/dsa-2464"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/53229"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48920"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48922"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48972"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/49047"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/49055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2458"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/53229"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-G8QF-H77H-C3GW
Vulnerability from github – Published: 2022-05-04 00:30 – Updated: 2022-05-04 00:30Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.
{
"affected": [],
"aliases": [
"CVE-2012-0477"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-04-25T10:10:00Z",
"severity": "MODERATE"
},
"details": "Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.",
"id": "GHSA-g8qf-h77h-c3gw",
"modified": "2022-05-04T00:30:39Z",
"published": "2022-05-04T00:30:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0477"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48920"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48922"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48972"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/49047"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/49055"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2012/dsa-2457"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2012/dsa-2458"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2012/dsa-2464"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/53229"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2012-0477
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-0477",
"description": "Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.",
"id": "GSD-2012-0477",
"references": [
"https://www.suse.com/security/cve/CVE-2012-0477.html",
"https://www.debian.org/security/2012/dsa-2457",
"https://www.debian.org/security/2012/dsa-2458",
"https://www.debian.org/security/2012/dsa-2464",
"https://access.redhat.com/errata/RHSA-2012:0516",
"https://access.redhat.com/errata/RHSA-2012:0515",
"https://linux.oracle.com/cve/CVE-2012-0477.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-0477"
],
"details": "Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.",
"id": "GSD-2012-0477",
"modified": "2023-12-13T01:20:13.770457Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-0477",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "48922",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48922"
},
{
"name": "oval:org.mitre.oval:def:16889",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
},
{
"name": "firefox-iso2022kr-xss(75154)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
},
{
"name": "53229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53229"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"name": "49055",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49055"
},
{
"name": "DSA-2458",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2458"
},
{
"name": "48920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48920"
},
{
"name": "DSA-2457",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2457"
},
{
"name": "DSA-2464",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2464"
},
{
"name": "MDVSA-2012:081",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "48972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48972"
},
{
"name": "MDVSA-2012:066",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"name": "49047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49047"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.9",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-0477"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718573"
},
{
"name": "53229",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/53229"
},
{
"name": "49047",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/49047"
},
{
"name": "49055",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/49055"
},
{
"name": "48972",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48972"
},
{
"name": "48920",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48920"
},
{
"name": "48922",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48922"
},
{
"name": "oval:org.mitre.oval:def:16889",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16889"
},
{
"name": "firefox-iso2022kr-xss(75154)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75154"
},
{
"name": "MDVSA-2012:081",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
},
{
"name": "MDVSA-2012:066",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
},
{
"name": "DSA-2464",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2012/dsa-2464"
},
{
"name": "DSA-2458",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2012/dsa-2458"
},
{
"name": "DSA-2457",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2012/dsa-2457"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2018-01-18T02:29Z",
"publishedDate": "2012-04-25T10:10Z"
}
}
}
CERTA-2012-AVI-234
Vulnerability from certfr_avis - Published: 2012-04-26 - Updated: 2012-04-26
Quatorze vulnérabilités ont été corrigées dans les produits Mozilla. La majorité permettent d'exécuter du code arbitraire à distance. Trois permettent de contourner des protections contre les attaques par « injection de code indirecte à distance » (XSS). Enfin, une vulnérabilité permet d'obtenir le nom de fichiers utilisés par l'application.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | versions antérieures à Thunderbird 12.0 ; | ||
| Mozilla | Firefox ESR | versions antérieures à Firefox ESR 10.0.4 ; | ||
| Mozilla | Thunderbird | versions antérieures à Thunderbird ESR 10.0.4 ; | ||
| Mozilla | N/A | versions antérieures à SeaMonkey 2.9. | ||
| Mozilla | Firefox | Versions antérieures à Firefox 12.0 ; |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "versions ant\u00e9rieures \u00e0 Thunderbird 12.0 ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "versions ant\u00e9rieures \u00e0 Firefox ESR 10.0.4 ;",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "versions ant\u00e9rieures \u00e0 Thunderbird ESR 10.0.4 ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "versions ant\u00e9rieures \u00e0 SeaMonkey 2.9.",
"product": {
"name": "N/A",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Versions ant\u00e9rieures \u00e0 Firefox 12.0 ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0474",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0474"
},
{
"name": "CVE-2012-0472",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0472"
},
{
"name": "CVE-2012-0470",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0470"
},
{
"name": "CVE-2011-3062",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3062"
},
{
"name": "CVE-2012-0475",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0475"
},
{
"name": "CVE-2012-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0467"
},
{
"name": "CVE-2012-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0469"
},
{
"name": "CVE-2012-0479",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0479"
},
{
"name": "CVE-2012-0477",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0477"
},
{
"name": "CVE-2012-0471",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0471"
},
{
"name": "CVE-2011-1187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1187"
},
{
"name": "CVE-2012-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0468"
},
{
"name": "CVE-2012-0478",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0478"
},
{
"name": "CVE-2012-0473",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0473"
}
],
"initial_release_date": "2012-04-26T00:00:00",
"last_revision_date": "2012-04-26T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-32 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-32.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-22 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-22.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-27 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-27.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-26 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-26.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-28 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-28.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-33 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-33.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-25 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-25.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-31 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-31.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-20 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-20.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-29 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-29.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-23 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-23.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-30 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-30.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-24 du 24 avril 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-24.html"
}
],
"reference": "CERTA-2012-AVI-234",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-04-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Quatorze vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eMozilla\u003c/span\u003e. La majorit\u00e9 permettent d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance. Trois permettent de contourner des protections\ncontre les attaques par \u00ab injection de code indirecte \u00e0 distance \u00bb\n(XSS). Enfin, une vuln\u00e9rabilit\u00e9 permet d\u0027obtenir le nom de fichiers\nutilis\u00e9s par l\u0027application.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 MFSA2012 du 24 avril 2012",
"url": null
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.