ID

VAR-201211-0168


CVE

CVE-2012-5830


TITLE

Mac OS X Multiple running on Mozilla Vulnerabilities in products that allow arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2012-005468

DESCRIPTION

Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to a memory-corruption vulnerability. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Note: This issue was previously discussed in BID 56607 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2012-91 through -106 Multiple Vulnerabilities), but has been moved to its own record to better document it. Thunderbird is an email client that supports IMAP, POP email protocols, and HTML email formats. A remote attacker could exploit this vulnerability to execute arbitrary code through HTML documents. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Mozilla Firefox / Thunderbird Multiple Vulnerabilities SECUNIA ADVISORY ID: SA51382 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51382/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51382 RELEASE DATE: 2012-11-21 DISCUSS ADVISORY: http://secunia.com/advisories/51382/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51382/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51382 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Mozilla Firefox and Mozilla Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and compromise a user's system. For more information: SA51358 SOLUTION: Update to version 10.0.11. OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2012:1482-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1482.html Issue date: 2012-11-20 CVE Names: CVE-2012-4201 CVE-2012-4202 CVE-2012-4207 CVE-2012-4209 CVE-2012-4210 CVE-2012-4214 CVE-2012-4215 CVE-2012-4216 CVE-2012-5829 CVE-2012-5830 CVE-2012-5833 CVE-2012-5835 CVE-2012-5839 CVE-2012-5840 CVE-2012-5841 CVE-2012-5842 ===================================================================== 1. Summary: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5839, CVE-2012-5840, CVE-2012-5842) A buffer overflow flaw was found in the way Firefox handled GIF (Graphics Interchange Format) images. A web page containing a malicious GIF image could cause Firefox to crash or, possibly, execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-4202) A flaw was found in the way the Style Inspector tool in Firefox handled certain Cascading Style Sheets (CSS). Running the tool (Tools -> Web Developer -> Inspect) on malicious CSS could result in the execution of HTML and CSS content with chrome privileges. (CVE-2012-4210) A flaw was found in the way Firefox decoded the HZ-GB-2312 character encoding. A web page containing malicious content could cause Firefox to run JavaScript code with the permissions of a different website. (CVE-2012-4207) A flaw was found in the location object implementation in Firefox. Malicious content could possibly use this flaw to allow restricted content to be loaded by plug-ins. (CVE-2012-4209) A flaw was found in the way cross-origin wrappers were implemented. Malicious content could use this flaw to perform cross-site scripting attacks. (CVE-2012-5841) A flaw was found in the evalInSandbox implementation in Firefox. Malicious content could use this flaw to perform cross-site scripting attacks. (CVE-2012-4201) For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 10.0.11 ESR. You can find a link to the Mozilla advisories in the References section of this erratum. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Mariusz Mlynski, Masato Kinugawa, Bobby Holley, and moz_bug_r_a4 as the original reporters of these issues. All Firefox users should upgrade to these updated packages, which contain Firefox version 10.0.11 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 877614 - CVE-2012-5842 Mozilla: Miscellaneous memory safety hazards (rv:10.0.11) (MFSA 2012-91) 877615 - CVE-2012-4202 Mozilla: Buffer overflow while rendering GIF images (MFSA 2012-92) 877616 - CVE-2012-4201 Mozilla: evalInSanbox location context incorrectly applied (MFSA 2012-93) 877628 - CVE-2012-5841 Mozilla: Improper security filtering for cross-origin wrappers (MFSA 2012-100) 877629 - CVE-2012-4207 Mozilla: Improper character decoding in HZ-GB-2312 charset (MFSA 2012-101) 877632 - CVE-2012-4209 Mozilla: Frames can shadow top.location (MFSA 2012-103) 877633 - CVE-2012-4210 Mozilla: CSS and HTML injection through Style Inspector (MFSA 2012-104) 877634 - CVE-2012-4214 CVE-2012-4215 CVE-2012-4216 CVE-2012-5829 CVE-2012-5839 CVE-2012-5840 Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) 877635 - CVE-2012-5830 CVE-2012-5833 CVE-2012-5835 Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-10.0.11-1.el5_8.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-10.0.11-1.el5_8.src.rpm i386: firefox-10.0.11-1.el5_8.i386.rpm firefox-debuginfo-10.0.11-1.el5_8.i386.rpm xulrunner-10.0.11-1.el5_8.i386.rpm xulrunner-debuginfo-10.0.11-1.el5_8.i386.rpm x86_64: firefox-10.0.11-1.el5_8.i386.rpm firefox-10.0.11-1.el5_8.x86_64.rpm firefox-debuginfo-10.0.11-1.el5_8.i386.rpm firefox-debuginfo-10.0.11-1.el5_8.x86_64.rpm xulrunner-10.0.11-1.el5_8.i386.rpm xulrunner-10.0.11-1.el5_8.x86_64.rpm xulrunner-debuginfo-10.0.11-1.el5_8.i386.rpm xulrunner-debuginfo-10.0.11-1.el5_8.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-10.0.11-1.el5_8.src.rpm i386: xulrunner-debuginfo-10.0.11-1.el5_8.i386.rpm xulrunner-devel-10.0.11-1.el5_8.i386.rpm x86_64: xulrunner-debuginfo-10.0.11-1.el5_8.i386.rpm xulrunner-debuginfo-10.0.11-1.el5_8.x86_64.rpm xulrunner-devel-10.0.11-1.el5_8.i386.rpm xulrunner-devel-10.0.11-1.el5_8.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-10.0.11-1.el5_8.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-10.0.11-1.el5_8.src.rpm i386: firefox-10.0.11-1.el5_8.i386.rpm firefox-debuginfo-10.0.11-1.el5_8.i386.rpm xulrunner-10.0.11-1.el5_8.i386.rpm xulrunner-debuginfo-10.0.11-1.el5_8.i386.rpm xulrunner-devel-10.0.11-1.el5_8.i386.rpm ia64: firefox-10.0.11-1.el5_8.ia64.rpm firefox-debuginfo-10.0.11-1.el5_8.ia64.rpm xulrunner-10.0.11-1.el5_8.ia64.rpm xulrunner-debuginfo-10.0.11-1.el5_8.ia64.rpm xulrunner-devel-10.0.11-1.el5_8.ia64.rpm ppc: firefox-10.0.11-1.el5_8.ppc.rpm firefox-debuginfo-10.0.11-1.el5_8.ppc.rpm xulrunner-10.0.11-1.el5_8.ppc.rpm xulrunner-10.0.11-1.el5_8.ppc64.rpm xulrunner-debuginfo-10.0.11-1.el5_8.ppc.rpm xulrunner-debuginfo-10.0.11-1.el5_8.ppc64.rpm xulrunner-devel-10.0.11-1.el5_8.ppc.rpm xulrunner-devel-10.0.11-1.el5_8.ppc64.rpm s390x: firefox-10.0.11-1.el5_8.s390.rpm firefox-10.0.11-1.el5_8.s390x.rpm firefox-debuginfo-10.0.11-1.el5_8.s390.rpm firefox-debuginfo-10.0.11-1.el5_8.s390x.rpm xulrunner-10.0.11-1.el5_8.s390.rpm xulrunner-10.0.11-1.el5_8.s390x.rpm xulrunner-debuginfo-10.0.11-1.el5_8.s390.rpm xulrunner-debuginfo-10.0.11-1.el5_8.s390x.rpm xulrunner-devel-10.0.11-1.el5_8.s390.rpm xulrunner-devel-10.0.11-1.el5_8.s390x.rpm x86_64: firefox-10.0.11-1.el5_8.i386.rpm firefox-10.0.11-1.el5_8.x86_64.rpm firefox-debuginfo-10.0.11-1.el5_8.i386.rpm firefox-debuginfo-10.0.11-1.el5_8.x86_64.rpm xulrunner-10.0.11-1.el5_8.i386.rpm xulrunner-10.0.11-1.el5_8.x86_64.rpm xulrunner-debuginfo-10.0.11-1.el5_8.i386.rpm xulrunner-debuginfo-10.0.11-1.el5_8.x86_64.rpm xulrunner-devel-10.0.11-1.el5_8.i386.rpm xulrunner-devel-10.0.11-1.el5_8.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/firefox-10.0.11-1.el6_3.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-10.0.11-1.el6_3.src.rpm i386: firefox-10.0.11-1.el6_3.i686.rpm firefox-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm x86_64: firefox-10.0.11-1.el6_3.i686.rpm firefox-10.0.11-1.el6_3.x86_64.rpm firefox-debuginfo-10.0.11-1.el6_3.i686.rpm firefox-debuginfo-10.0.11-1.el6_3.x86_64.rpm xulrunner-10.0.11-1.el6_3.i686.rpm xulrunner-10.0.11-1.el6_3.x86_64.rpm xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-10.0.11-1.el6_3.src.rpm i386: xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-devel-10.0.11-1.el6_3.i686.rpm x86_64: xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.x86_64.rpm xulrunner-devel-10.0.11-1.el6_3.i686.rpm xulrunner-devel-10.0.11-1.el6_3.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/firefox-10.0.11-1.el6_3.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xulrunner-10.0.11-1.el6_3.src.rpm x86_64: firefox-10.0.11-1.el6_3.i686.rpm firefox-10.0.11-1.el6_3.x86_64.rpm firefox-debuginfo-10.0.11-1.el6_3.i686.rpm firefox-debuginfo-10.0.11-1.el6_3.x86_64.rpm xulrunner-10.0.11-1.el6_3.i686.rpm xulrunner-10.0.11-1.el6_3.x86_64.rpm xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.x86_64.rpm xulrunner-devel-10.0.11-1.el6_3.i686.rpm xulrunner-devel-10.0.11-1.el6_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/firefox-10.0.11-1.el6_3.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-10.0.11-1.el6_3.src.rpm i386: firefox-10.0.11-1.el6_3.i686.rpm firefox-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm ppc64: firefox-10.0.11-1.el6_3.ppc.rpm firefox-10.0.11-1.el6_3.ppc64.rpm firefox-debuginfo-10.0.11-1.el6_3.ppc.rpm firefox-debuginfo-10.0.11-1.el6_3.ppc64.rpm xulrunner-10.0.11-1.el6_3.ppc.rpm xulrunner-10.0.11-1.el6_3.ppc64.rpm xulrunner-debuginfo-10.0.11-1.el6_3.ppc.rpm xulrunner-debuginfo-10.0.11-1.el6_3.ppc64.rpm s390x: firefox-10.0.11-1.el6_3.s390.rpm firefox-10.0.11-1.el6_3.s390x.rpm firefox-debuginfo-10.0.11-1.el6_3.s390.rpm firefox-debuginfo-10.0.11-1.el6_3.s390x.rpm xulrunner-10.0.11-1.el6_3.s390.rpm xulrunner-10.0.11-1.el6_3.s390x.rpm xulrunner-debuginfo-10.0.11-1.el6_3.s390.rpm xulrunner-debuginfo-10.0.11-1.el6_3.s390x.rpm x86_64: firefox-10.0.11-1.el6_3.i686.rpm firefox-10.0.11-1.el6_3.x86_64.rpm firefox-debuginfo-10.0.11-1.el6_3.i686.rpm firefox-debuginfo-10.0.11-1.el6_3.x86_64.rpm xulrunner-10.0.11-1.el6_3.i686.rpm xulrunner-10.0.11-1.el6_3.x86_64.rpm xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-10.0.11-1.el6_3.src.rpm i386: xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-devel-10.0.11-1.el6_3.i686.rpm ppc64: xulrunner-debuginfo-10.0.11-1.el6_3.ppc.rpm xulrunner-debuginfo-10.0.11-1.el6_3.ppc64.rpm xulrunner-devel-10.0.11-1.el6_3.ppc.rpm xulrunner-devel-10.0.11-1.el6_3.ppc64.rpm s390x: xulrunner-debuginfo-10.0.11-1.el6_3.s390.rpm xulrunner-debuginfo-10.0.11-1.el6_3.s390x.rpm xulrunner-devel-10.0.11-1.el6_3.s390.rpm xulrunner-devel-10.0.11-1.el6_3.s390x.rpm x86_64: xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.x86_64.rpm xulrunner-devel-10.0.11-1.el6_3.i686.rpm xulrunner-devel-10.0.11-1.el6_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/firefox-10.0.11-1.el6_3.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-10.0.11-1.el6_3.src.rpm i386: firefox-10.0.11-1.el6_3.i686.rpm firefox-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm x86_64: firefox-10.0.11-1.el6_3.i686.rpm firefox-10.0.11-1.el6_3.x86_64.rpm firefox-debuginfo-10.0.11-1.el6_3.i686.rpm firefox-debuginfo-10.0.11-1.el6_3.x86_64.rpm xulrunner-10.0.11-1.el6_3.i686.rpm xulrunner-10.0.11-1.el6_3.x86_64.rpm xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-10.0.11-1.el6_3.src.rpm i386: xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-devel-10.0.11-1.el6_3.i686.rpm x86_64: xulrunner-debuginfo-10.0.11-1.el6_3.i686.rpm xulrunner-debuginfo-10.0.11-1.el6_3.x86_64.rpm xulrunner-devel-10.0.11-1.el6_3.i686.rpm xulrunner-devel-10.0.11-1.el6_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-4201.html https://www.redhat.com/security/data/cve/CVE-2012-4202.html https://www.redhat.com/security/data/cve/CVE-2012-4207.html https://www.redhat.com/security/data/cve/CVE-2012-4209.html https://www.redhat.com/security/data/cve/CVE-2012-4210.html https://www.redhat.com/security/data/cve/CVE-2012-4214.html https://www.redhat.com/security/data/cve/CVE-2012-4215.html https://www.redhat.com/security/data/cve/CVE-2012-4216.html https://www.redhat.com/security/data/cve/CVE-2012-5829.html https://www.redhat.com/security/data/cve/CVE-2012-5830.html https://www.redhat.com/security/data/cve/CVE-2012-5833.html https://www.redhat.com/security/data/cve/CVE-2012-5835.html https://www.redhat.com/security/data/cve/CVE-2012-5839.html https://www.redhat.com/security/data/cve/CVE-2012-5840.html https://www.redhat.com/security/data/cve/CVE-2012-5841.html https://www.redhat.com/security/data/cve/CVE-2012-5842.html https://access.redhat.com/security/updates/classification/#critical http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFQrAQhXlSAg2UNWIIRAoZOAKCKhpGeDkpysgcRxl8aukbRupko8wCgpSj5 sb5bZvy6STTsMSr7lG2E8nQ= =N5l8 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Note: All issues except CVE-2012-4202 cannot be exploited by a specially-crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Mozilla Products: Multiple vulnerabilities Date: January 08, 2013 Bugs: #180159, #181361, #207261, #238535, #246602, #251322, #255221, #255234, #255687, #257577, #260062, #261386, #262704, #267234, #273918, #277752, #280226, #280234, #280393, #282549, #284439, #286721, #290892, #292034, #297532, #305689, #307045, #311021, #312361, #312645, #312651, #312675, #312679, #312763, #313003, #324735, #326341, #329279, #336396, #341821, #342847, #348316, #357057, #360055, #360315, #365323, #373595, #379549, #381245, #388045, #390771, #395431, #401701, #403183, #404437, #408161, #413657, #419917, #427224, #433383, #437780, #439586, #439960, #444318 ID: 201301-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may allow execution of arbitrary code or local privilege escalation. The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the 'Mozilla Application Suite'. NSS is Mozilla's Network Security Services library that implements PKI support. IceCat is the GNU version of Firefox. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/firefox < 10.0.11 >= 10.0.11 2 www-client/firefox-bin < 10.0.11 >= 10.0.11 3 mail-client/thunderbird < 10.0.11 >= 10.0.11 4 mail-client/thunderbird-bin < 10.0.11 >= 10.0.11 5 www-client/seamonkey < 2.14-r1 >= 2.14-r1 6 www-client/seamonkey-bin < 2.14 >= 2.14 7 dev-libs/nss < 3.14 >= 3.14 8 www-client/mozilla-firefox <= 3.6.8 Vulnerable! 9 www-client/mozilla-firefox-bin <= 3.5.6 Vulnerable! 10 mail-client/mozilla-thunderbird <= 3.0.4-r1 Vulnerable! 11 mail-client/mozilla-thunderbird-bin <= 3.0 Vulnerable! 12 www-client/icecat <= 10.0-r1 Vulnerable! 13 net-libs/xulrunner <= 2.0-r1 Vulnerable! 14 net-libs/xulrunner-bin <= 1.8.1.19 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. Please review the CVE identifiers referenced below for details. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL's for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser's font, conduct clickjacking attacks, or have other unspecified impact. A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-10.0.11" All users of the Mozilla Firefox binary package should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-10.0.11"= All Mozilla Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-10.0.11" All users of the Mozilla Thunderbird binary package should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-10.0.11" All Mozilla SeaMonkey users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-2.14-r1" All users of the Mozilla SeaMonkey binary package should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-2.14" All NSS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.14" The "www-client/mozilla-firefox" package has been merged into the "www-client/firefox" package. To upgrade, please unmerge "www-client/mozilla-firefox" and then emerge the latest "www-client/firefox" package: # emerge --sync # emerge --unmerge "www-client/mozilla-firefox" # emerge --ask --oneshot --verbose ">=www-client/firefox-10.0.11" The "www-client/mozilla-firefox-bin" package has been merged into the "www-client/firefox-bin" package. To upgrade, please unmerge "www-client/mozilla-firefox-bin" and then emerge the latest "www-client/firefox-bin" package: # emerge --sync # emerge --unmerge "www-client/mozilla-firefox-bin" # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-10.0.11"= The "mail-client/mozilla-thunderbird" package has been merged into the "mail-client/thunderbird" package. To upgrade, please unmerge "mail-client/mozilla-thunderbird" and then emerge the latest "mail-client/thunderbird" package: # emerge --sync # emerge --unmerge "mail-client/mozilla-thunderbird" # emerge --ask --oneshot -v ">=mail-client/thunderbird-10.0.11" The "mail-client/mozilla-thunderbird-bin" package has been merged into the "mail-client/thunderbird-bin" package. To upgrade, please unmerge "mail-client/mozilla-thunderbird-bin" and then emerge the latest "mail-client/thunderbird-bin" package: # emerge --sync # emerge --unmerge "mail-client/mozilla-thunderbird-bin" # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-10.0.11" Gentoo discontinued support for GNU IceCat. We recommend that users unmerge GNU IceCat: # emerge --unmerge "www-client/icecat" Gentoo discontinued support for XULRunner. We recommend that users unmerge XULRunner: # emerge --unmerge "net-libs/xulrunner" Gentoo discontinued support for the XULRunner binary package. We recommend that users unmerge XULRunner: # emerge --unmerge "net-libs/xulrunner-bin" References ========== [ 1 ] CVE-2011-3101 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3101 [ 2 ] CVE-2007-2436 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2436 [ 3 ] CVE-2007-2437 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2437 [ 4 ] CVE-2007-2671 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2671 [ 5 ] CVE-2007-3073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3073 [ 6 ] CVE-2008-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0016 [ 7 ] CVE-2008-0017 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0017 [ 8 ] CVE-2008-0367 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0367 [ 9 ] CVE-2008-3835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3835 [ 10 ] CVE-2008-3836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3836 [ 11 ] CVE-2008-3837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3837 [ 12 ] CVE-2008-4058 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4058 [ 13 ] CVE-2008-4059 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4059 [ 14 ] CVE-2008-4060 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4060 [ 15 ] CVE-2008-4061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4061 [ 16 ] CVE-2008-4062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4062 [ 17 ] CVE-2008-4063 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4063 [ 18 ] CVE-2008-4064 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4064 [ 19 ] CVE-2008-4065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4065 [ 20 ] CVE-2008-4066 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4066 [ 21 ] CVE-2008-4067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4067 [ 22 ] CVE-2008-4068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4068 [ 23 ] CVE-2008-4069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4069 [ 24 ] CVE-2008-4070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4070 [ 25 ] CVE-2008-4582 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4582 [ 26 ] CVE-2008-5012 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5012 [ 27 ] CVE-2008-5013 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5013 [ 28 ] CVE-2008-5014 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5014 [ 29 ] CVE-2008-5015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5015 [ 30 ] CVE-2008-5016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5016 [ 31 ] CVE-2008-5017 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5017 [ 32 ] CVE-2008-5018 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5018 [ 33 ] CVE-2008-5019 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5019 [ 34 ] CVE-2008-5021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5021 [ 35 ] CVE-2008-5022 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5022 [ 36 ] CVE-2008-5023 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5023 [ 37 ] CVE-2008-5024 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5024 [ 38 ] CVE-2008-5052 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5052 [ 39 ] CVE-2008-5500 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5500 [ 40 ] CVE-2008-5501 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5501 [ 41 ] CVE-2008-5502 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5502 [ 42 ] CVE-2008-5503 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5503 [ 43 ] CVE-2008-5504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5504 [ 44 ] CVE-2008-5505 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5505 [ 45 ] CVE-2008-5506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5506 [ 46 ] CVE-2008-5507 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5507 [ 47 ] CVE-2008-5508 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5508 [ 48 ] CVE-2008-5510 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5510 [ 49 ] CVE-2008-5511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5511 [ 50 ] CVE-2008-5512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5512 [ 51 ] CVE-2008-5513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5513 [ 52 ] CVE-2008-5822 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5822 [ 53 ] CVE-2008-5913 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5913 [ 54 ] CVE-2008-6961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6961 [ 55 ] CVE-2009-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071 [ 56 ] CVE-2009-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071 [ 57 ] CVE-2009-0352 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0352 [ 58 ] CVE-2009-0353 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0353 [ 59 ] CVE-2009-0354 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0354 [ 60 ] CVE-2009-0355 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0355 [ 61 ] CVE-2009-0356 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0356 [ 62 ] CVE-2009-0357 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0357 [ 63 ] CVE-2009-0358 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0358 [ 64 ] CVE-2009-0652 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0652 [ 65 ] CVE-2009-0771 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0771 [ 66 ] CVE-2009-0772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0772 [ 67 ] CVE-2009-0773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0773 [ 68 ] CVE-2009-0774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0774 [ 69 ] CVE-2009-0775 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0775 [ 70 ] CVE-2009-0776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0776 [ 71 ] CVE-2009-0777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0777 [ 72 ] CVE-2009-1044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1044 [ 73 ] CVE-2009-1169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1169 [ 74 ] CVE-2009-1302 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1302 [ 75 ] CVE-2009-1303 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1303 [ 76 ] CVE-2009-1304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1304 [ 77 ] CVE-2009-1305 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1305 [ 78 ] CVE-2009-1306 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1306 [ 79 ] CVE-2009-1307 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1307 [ 80 ] CVE-2009-1308 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1308 [ 81 ] CVE-2009-1309 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1309 [ 82 ] CVE-2009-1310 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1310 [ 83 ] CVE-2009-1311 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1311 [ 84 ] CVE-2009-1312 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1312 [ 85 ] CVE-2009-1313 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1313 [ 86 ] CVE-2009-1392 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1392 [ 87 ] CVE-2009-1563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1563 [ 88 ] CVE-2009-1571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1571 [ 89 ] CVE-2009-1828 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1828 [ 90 ] CVE-2009-1832 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1832 [ 91 ] CVE-2009-1833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1833 [ 92 ] CVE-2009-1834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1834 [ 93 ] CVE-2009-1835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1835 [ 94 ] CVE-2009-1836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1836 [ 95 ] CVE-2009-1837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1837 [ 96 ] CVE-2009-1838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1838 [ 97 ] CVE-2009-1839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1839 [ 98 ] CVE-2009-1840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1840 [ 99 ] CVE-2009-1841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1841 [ 100 ] CVE-2009-2043 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2043 [ 101 ] CVE-2009-2044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2044 [ 102 ] CVE-2009-2061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2061 [ 103 ] CVE-2009-2065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2065 [ 104 ] CVE-2009-2210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2210 [ 105 ] CVE-2009-2404 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2404 [ 106 ] CVE-2009-2408 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2408 [ 107 ] CVE-2009-2462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2462 [ 108 ] CVE-2009-2463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2463 [ 109 ] CVE-2009-2464 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2464 [ 110 ] CVE-2009-2465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2465 [ 111 ] CVE-2009-2466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2466 [ 112 ] CVE-2009-2467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2467 [ 113 ] CVE-2009-2469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2469 [ 114 ] CVE-2009-2470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2470 [ 115 ] CVE-2009-2471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2471 [ 116 ] CVE-2009-2472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2472 [ 117 ] CVE-2009-2477 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2477 [ 118 ] CVE-2009-2478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2478 [ 119 ] CVE-2009-2479 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2479 [ 120 ] CVE-2009-2535 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2535 [ 121 ] CVE-2009-2654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2654 [ 122 ] CVE-2009-2662 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2662 [ 123 ] CVE-2009-2664 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2664 [ 124 ] CVE-2009-2665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2665 [ 125 ] CVE-2009-3069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3069 [ 126 ] CVE-2009-3070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3070 [ 127 ] CVE-2009-3071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3071 [ 128 ] CVE-2009-3072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3072 [ 129 ] CVE-2009-3074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3074 [ 130 ] CVE-2009-3075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3075 [ 131 ] CVE-2009-3076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3076 [ 132 ] CVE-2009-3077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3077 [ 133 ] CVE-2009-3078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3078 [ 134 ] CVE-2009-3079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3079 [ 135 ] CVE-2009-3274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3274 [ 136 ] CVE-2009-3371 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3371 [ 137 ] CVE-2009-3372 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3372 [ 138 ] CVE-2009-3373 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3373 [ 139 ] CVE-2009-3374 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3374 [ 140 ] CVE-2009-3375 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3375 [ 141 ] CVE-2009-3376 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3376 [ 142 ] CVE-2009-3377 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3377 [ 143 ] CVE-2009-3378 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3378 [ 144 ] CVE-2009-3379 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3379 [ 145 ] CVE-2009-3380 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3380 [ 146 ] CVE-2009-3381 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3381 [ 147 ] CVE-2009-3382 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3382 [ 148 ] CVE-2009-3383 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3383 [ 149 ] CVE-2009-3388 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388 [ 150 ] CVE-2009-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389 [ 151 ] CVE-2009-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555 [ 152 ] CVE-2009-3978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3978 [ 153 ] CVE-2009-3979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979 [ 154 ] CVE-2009-3980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3980 [ 155 ] CVE-2009-3981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3981 [ 156 ] CVE-2009-3982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982 [ 157 ] CVE-2009-3983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983 [ 158 ] CVE-2009-3984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984 [ 159 ] CVE-2009-3985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985 [ 160 ] CVE-2009-3986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986 [ 161 ] CVE-2009-3987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987 [ 162 ] CVE-2009-3988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3988 [ 163 ] CVE-2010-0159 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0159 [ 164 ] CVE-2010-0160 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0160 [ 165 ] CVE-2010-0162 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0162 [ 166 ] CVE-2010-0163 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0163 [ 167 ] CVE-2010-0164 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0164 [ 168 ] CVE-2010-0165 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0165 [ 169 ] CVE-2010-0166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0166 [ 170 ] CVE-2010-0167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167 [ 171 ] CVE-2010-0167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167 [ 172 ] CVE-2010-0168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0168 [ 173 ] CVE-2010-0169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169 [ 174 ] CVE-2010-0169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169 [ 175 ] CVE-2010-0170 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0170 [ 176 ] CVE-2010-0171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171 [ 177 ] CVE-2010-0171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171 [ 178 ] CVE-2010-0172 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0172 [ 179 ] CVE-2010-0173 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0173 [ 180 ] CVE-2010-0174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174 [ 181 ] CVE-2010-0174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174 [ 182 ] CVE-2010-0175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175 [ 183 ] CVE-2010-0175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175 [ 184 ] CVE-2010-0176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176 [ 185 ] CVE-2010-0176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176 [ 186 ] CVE-2010-0177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0177 [ 187 ] CVE-2010-0178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0178 [ 188 ] CVE-2010-0179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0179 [ 189 ] CVE-2010-0181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0181 [ 190 ] CVE-2010-0182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0182 [ 191 ] CVE-2010-0183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0183 [ 192 ] CVE-2010-0220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0220 [ 193 ] CVE-2010-0648 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0648 [ 194 ] CVE-2010-0654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0654 [ 195 ] CVE-2010-1028 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1028 [ 196 ] CVE-2010-1121 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1121 [ 197 ] CVE-2010-1125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1125 [ 198 ] CVE-2010-1196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1196 [ 199 ] CVE-2010-1197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1197 [ 200 ] CVE-2010-1198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1198 [ 201 ] CVE-2010-1199 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1199 [ 202 ] CVE-2010-1200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1200 [ 203 ] CVE-2010-1201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1201 [ 204 ] CVE-2010-1202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1202 [ 205 ] CVE-2010-1203 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1203 [ 206 ] CVE-2010-1205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205 [ 207 ] CVE-2010-1206 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1206 [ 208 ] CVE-2010-1207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1207 [ 209 ] CVE-2010-1208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1208 [ 210 ] CVE-2010-1209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1209 [ 211 ] CVE-2010-1210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1210 [ 212 ] CVE-2010-1211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1211 [ 213 ] CVE-2010-1212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1212 [ 214 ] CVE-2010-1213 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1213 [ 215 ] CVE-2010-1214 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1214 [ 216 ] CVE-2010-1215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1215 [ 217 ] CVE-2010-1585 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1585 [ 218 ] CVE-2010-2751 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2751 [ 219 ] CVE-2010-2752 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2752 [ 220 ] CVE-2010-2753 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2753 [ 221 ] CVE-2010-2754 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2754 [ 222 ] CVE-2010-2755 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2755 [ 223 ] CVE-2010-2760 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2760 [ 224 ] CVE-2010-2762 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2762 [ 225 ] CVE-2010-2763 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2763 [ 226 ] CVE-2010-2764 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2764 [ 227 ] CVE-2010-2765 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2765 [ 228 ] CVE-2010-2766 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2766 [ 229 ] CVE-2010-2767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2767 [ 230 ] CVE-2010-2768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2768 [ 231 ] CVE-2010-2769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2769 [ 232 ] CVE-2010-2770 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2770 [ 233 ] CVE-2010-3131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3131 [ 234 ] CVE-2010-3166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3166 [ 235 ] CVE-2010-3167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3167 [ 236 ] CVE-2010-3168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3168 [ 237 ] CVE-2010-3169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3169 [ 238 ] CVE-2010-3170 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3170 [ 239 ] CVE-2010-3171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3171 [ 240 ] CVE-2010-3173 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3173 [ 241 ] CVE-2010-3174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3174 [ 242 ] CVE-2010-3175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3175 [ 243 ] CVE-2010-3176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3176 [ 244 ] CVE-2010-3177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3177 [ 245 ] CVE-2010-3178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3178 [ 246 ] CVE-2010-3179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3179 [ 247 ] CVE-2010-3180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3180 [ 248 ] CVE-2010-3182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3182 [ 249 ] CVE-2010-3183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3183 [ 250 ] CVE-2010-3399 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3399 [ 251 ] CVE-2010-3400 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3400 [ 252 ] CVE-2010-3765 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3765 [ 253 ] CVE-2010-3766 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3766 [ 254 ] CVE-2010-3767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3767 [ 255 ] CVE-2010-3768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3768 [ 256 ] CVE-2010-3769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3769 [ 257 ] CVE-2010-3770 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3770 [ 258 ] CVE-2010-3771 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3771 [ 259 ] CVE-2010-3772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3772 [ 260 ] CVE-2010-3773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3773 [ 261 ] CVE-2010-3774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3774 [ 262 ] CVE-2010-3775 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3775 [ 263 ] CVE-2010-3776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3776 [ 264 ] CVE-2010-3777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3777 [ 265 ] CVE-2010-3778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3778 [ 266 ] CVE-2010-4508 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4508 [ 267 ] CVE-2010-5074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5074 [ 268 ] CVE-2011-0051 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0051 [ 269 ] CVE-2011-0053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0053 [ 270 ] CVE-2011-0054 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0054 [ 271 ] CVE-2011-0055 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0055 [ 272 ] CVE-2011-0056 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0056 [ 273 ] CVE-2011-0057 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0057 [ 274 ] CVE-2011-0058 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0058 [ 275 ] CVE-2011-0059 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0059 [ 276 ] CVE-2011-0061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0061 [ 277 ] CVE-2011-0062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0062 [ 278 ] CVE-2011-0065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0065 [ 279 ] CVE-2011-0066 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0066 [ 280 ] CVE-2011-0067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0067 [ 281 ] CVE-2011-0068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0068 [ 282 ] CVE-2011-0069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0069 [ 283 ] CVE-2011-0070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0070 [ 284 ] CVE-2011-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0071 [ 285 ] CVE-2011-0072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0072 [ 286 ] CVE-2011-0073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0073 [ 287 ] CVE-2011-0074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0074 [ 288 ] CVE-2011-0075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0075 [ 289 ] CVE-2011-0076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0076 [ 290 ] CVE-2011-0077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0077 [ 291 ] CVE-2011-0078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0078 [ 292 ] CVE-2011-0079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0079 [ 293 ] CVE-2011-0080 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0080 [ 294 ] CVE-2011-0081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0081 [ 295 ] CVE-2011-0082 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0082 [ 296 ] CVE-2011-0083 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0083 [ 297 ] CVE-2011-0084 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0084 [ 298 ] CVE-2011-0085 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0085 [ 299 ] CVE-2011-1187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1187 [ 300 ] CVE-2011-1202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1202 [ 301 ] CVE-2011-1712 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1712 [ 302 ] CVE-2011-2362 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2362 [ 303 ] CVE-2011-2363 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2363 [ 304 ] CVE-2011-2364 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2364 [ 305 ] CVE-2011-2365 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2365 [ 306 ] CVE-2011-2369 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2369 [ 307 ] CVE-2011-2370 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2370 [ 308 ] CVE-2011-2371 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2371 [ 309 ] CVE-2011-2372 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2372 [ 310 ] CVE-2011-2373 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2373 [ 311 ] CVE-2011-2374 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2374 [ 312 ] CVE-2011-2375 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2375 [ 313 ] CVE-2011-2376 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2376 [ 314 ] CVE-2011-2377 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2377 [ 315 ] CVE-2011-2378 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2378 [ 316 ] CVE-2011-2605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2605 [ 317 ] CVE-2011-2980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2980 [ 318 ] CVE-2011-2981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2981 [ 319 ] CVE-2011-2982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2982 [ 320 ] CVE-2011-2983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2983 [ 321 ] CVE-2011-2984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2984 [ 322 ] CVE-2011-2985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2985 [ 323 ] CVE-2011-2986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2986 [ 324 ] CVE-2011-2987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2987 [ 325 ] CVE-2011-2988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2988 [ 326 ] CVE-2011-2989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2989 [ 327 ] CVE-2011-2990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2990 [ 328 ] CVE-2011-2991 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2991 [ 329 ] CVE-2011-2993 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2993 [ 330 ] CVE-2011-2995 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2995 [ 331 ] CVE-2011-2996 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2996 [ 332 ] CVE-2011-2997 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2997 [ 333 ] CVE-2011-2998 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2998 [ 334 ] CVE-2011-2999 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2999 [ 335 ] CVE-2011-3000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3000 [ 336 ] CVE-2011-3001 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3001 [ 337 ] CVE-2011-3002 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3002 [ 338 ] CVE-2011-3003 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3003 [ 339 ] CVE-2011-3004 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3004 [ 340 ] CVE-2011-3005 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3005 [ 341 ] CVE-2011-3026 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026 [ 342 ] CVE-2011-3062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3062 [ 343 ] CVE-2011-3232 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3232 [ 344 ] CVE-2011-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389 [ 345 ] CVE-2011-3640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3640 [ 346 ] CVE-2011-3647 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3647 [ 347 ] CVE-2011-3648 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3648 [ 348 ] CVE-2011-3649 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3649 [ 349 ] CVE-2011-3650 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3650 [ 350 ] CVE-2011-3651 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3651 [ 351 ] CVE-2011-3652 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3652 [ 352 ] CVE-2011-3653 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3653 [ 353 ] CVE-2011-3654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3654 [ 354 ] CVE-2011-3655 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3655 [ 355 ] CVE-2011-3658 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3658 [ 356 ] CVE-2011-3659 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3659 [ 357 ] CVE-2011-3660 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3660 [ 358 ] CVE-2011-3661 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3661 [ 359 ] CVE-2011-3663 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3663 [ 360 ] CVE-2011-3665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3665 [ 361 ] CVE-2011-3670 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3670 [ 362 ] CVE-2011-3866 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3866 [ 363 ] CVE-2011-4688 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4688 [ 364 ] CVE-2012-0441 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0441 [ 365 ] CVE-2012-0442 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0442 [ 366 ] CVE-2012-0443 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0443 [ 367 ] CVE-2012-0444 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0444 [ 368 ] CVE-2012-0445 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0445 [ 369 ] CVE-2012-0446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0446 [ 370 ] CVE-2012-0447 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0447 [ 371 ] CVE-2012-0449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0449 [ 372 ] CVE-2012-0450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0450 [ 373 ] CVE-2012-0451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0451 [ 374 ] CVE-2012-0452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0452 [ 375 ] CVE-2012-0455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0455 [ 376 ] CVE-2012-0456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0456 [ 377 ] CVE-2012-0457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0457 [ 378 ] CVE-2012-0458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0458 [ 379 ] CVE-2012-0459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0459 [ 380 ] CVE-2012-0460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0460 [ 381 ] CVE-2012-0461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0461 [ 382 ] CVE-2012-0462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0462 [ 383 ] CVE-2012-0463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0463 [ 384 ] CVE-2012-0464 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0464 [ 385 ] CVE-2012-0467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0467 [ 386 ] CVE-2012-0468 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0468 [ 387 ] CVE-2012-0469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0469 [ 388 ] CVE-2012-0470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0470 [ 389 ] CVE-2012-0471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0471 [ 390 ] CVE-2012-0473 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0473 [ 391 ] CVE-2012-0474 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0474 [ 392 ] CVE-2012-0475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0475 [ 393 ] CVE-2012-0477 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0477 [ 394 ] CVE-2012-0478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0478 [ 395 ] CVE-2012-0479 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0479 [ 396 ] CVE-2012-1937 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1937 [ 397 ] CVE-2012-1938 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1938 [ 398 ] CVE-2012-1939 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1939 [ 399 ] CVE-2012-1940 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1940 [ 400 ] CVE-2012-1941 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1941 [ 401 ] CVE-2012-1945 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1945 [ 402 ] CVE-2012-1946 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1946 [ 403 ] CVE-2012-1947 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1947 [ 404 ] CVE-2012-1948 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1948 [ 405 ] CVE-2012-1949 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1949 [ 406 ] CVE-2012-1950 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1950 [ 407 ] CVE-2012-1951 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1951 [ 408 ] CVE-2012-1952 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1952 [ 409 ] CVE-2012-1953 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1953 [ 410 ] CVE-2012-1954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1954 [ 411 ] CVE-2012-1955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1955 [ 412 ] CVE-2012-1956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1956 [ 413 ] CVE-2012-1957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1957 [ 414 ] CVE-2012-1958 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1958 [ 415 ] CVE-2012-1959 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1959 [ 416 ] CVE-2012-1960 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1960 [ 417 ] CVE-2012-1961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1961 [ 418 ] CVE-2012-1962 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1962 [ 419 ] CVE-2012-1963 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1963 [ 420 ] CVE-2012-1964 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1964 [ 421 ] CVE-2012-1965 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1965 [ 422 ] CVE-2012-1966 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1966 [ 423 ] CVE-2012-1967 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1967 [ 424 ] CVE-2012-1970 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1970 [ 425 ] CVE-2012-1971 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1971 [ 426 ] CVE-2012-1972 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1972 [ 427 ] CVE-2012-1973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1973 [ 428 ] CVE-2012-1974 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1974 [ 429 ] CVE-2012-1975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1975 [ 430 ] CVE-2012-1976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1976 [ 431 ] CVE-2012-1994 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1994 [ 432 ] CVE-2012-3956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3956 [ 433 ] CVE-2012-3957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3957 [ 434 ] CVE-2012-3958 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3958 [ 435 ] CVE-2012-3959 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3959 [ 436 ] CVE-2012-3960 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3960 [ 437 ] CVE-2012-3961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3961 [ 438 ] CVE-2012-3962 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3962 [ 439 ] CVE-2012-3963 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3963 [ 440 ] CVE-2012-3964 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3964 [ 441 ] CVE-2012-3965 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3965 [ 442 ] CVE-2012-3966 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3966 [ 443 ] CVE-2012-3967 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3967 [ 444 ] CVE-2012-3968 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3968 [ 445 ] CVE-2012-3969 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3969 [ 446 ] CVE-2012-3970 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3970 [ 447 ] CVE-2012-3971 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3971 [ 448 ] CVE-2012-3972 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3972 [ 449 ] CVE-2012-3973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3973 [ 450 ] CVE-2012-3975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3975 [ 451 ] CVE-2012-3976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3976 [ 452 ] CVE-2012-3977 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3977 [ 453 ] CVE-2012-3978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3978 [ 454 ] CVE-2012-3980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3980 [ 455 ] CVE-2012-3982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3982 [ 456 ] CVE-2012-3984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3984 [ 457 ] CVE-2012-3985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3985 [ 458 ] CVE-2012-3986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3986 [ 459 ] CVE-2012-3988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3988 [ 460 ] CVE-2012-3989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3989 [ 461 ] CVE-2012-3990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3990 [ 462 ] CVE-2012-3991 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3991 [ 463 ] CVE-2012-3992 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3992 [ 464 ] CVE-2012-3993 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3993 [ 465 ] CVE-2012-3994 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3994 [ 466 ] CVE-2012-3995 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3995 [ 467 ] CVE-2012-4179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4179 [ 468 ] CVE-2012-4180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4180 [ 469 ] CVE-2012-4181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4181 [ 470 ] CVE-2012-4182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4182 [ 471 ] CVE-2012-4183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4183 [ 472 ] CVE-2012-4184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4184 [ 473 ] CVE-2012-4185 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4185 [ 474 ] CVE-2012-4186 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4186 [ 475 ] CVE-2012-4187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4187 [ 476 ] CVE-2012-4188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4188 [ 477 ] CVE-2012-4190 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4190 [ 478 ] CVE-2012-4191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4191 [ 479 ] CVE-2012-4192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4192 [ 480 ] CVE-2012-4193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4193 [ 481 ] CVE-2012-4194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4194 [ 482 ] CVE-2012-4195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4195 [ 483 ] CVE-2012-4196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4196 [ 484 ] CVE-2012-4201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4201 [ 485 ] CVE-2012-4202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4202 [ 486 ] CVE-2012-4204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4204 [ 487 ] CVE-2012-4205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4205 [ 488 ] CVE-2012-4206 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4206 [ 489 ] CVE-2012-4207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4207 [ 490 ] CVE-2012-4208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4208 [ 491 ] CVE-2012-4209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4209 [ 492 ] CVE-2012-4210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4210 [ 493 ] CVE-2012-4212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4212 [ 494 ] CVE-2012-4215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4215 [ 495 ] CVE-2012-4216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4216 [ 496 ] CVE-2012-5354 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5354 [ 497 ] CVE-2012-5829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5829 [ 498 ] CVE-2012-5830 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5830 [ 499 ] CVE-2012-5833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5833 [ 500 ] CVE-2012-5835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5835 [ 501 ] CVE-2012-5836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5836 [ 502 ] CVE-2012-5838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5838 [ 503 ] CVE-2012-5839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5839 [ 504 ] CVE-2012-5840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5840 [ 505 ] CVE-2012-5841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5841 [ 506 ] CVE-2012-5842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5842 [ 507 ] CVE-2012-5843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5843 [ 508 ] Firefox Blocking Fraudulent Certificates http://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-c= ertificates/ [ 509 ] Mozilla Foundation Security Advisory 2011-11 http://www.mozilla.org/security/announce/2011/mfsa2011-11.html [ 510 ] Mozilla Foundation Security Advisory 2011-34 http://www.mozilla.org/security/announce/2011/mfsa2011-34.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201301-01.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.34

sources: NVD: CVE-2012-5830 // JVNDB: JVNDB-2012-005468 // BID: 56641 // VULHUB: VHN-59111 // PACKETSTORM: 118290 // PACKETSTORM: 118248 // PACKETSTORM: 118247 // PACKETSTORM: 119293

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.3

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:ltversion:17.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:5.0

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11.0

Trust: 1.0

vendor:mozillamodel:firefoxscope:gteversion:10.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.10

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.1

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:mozillamodel:firefoxscope:ltversion:10.0.11

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:11.10

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:5.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.4

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 1.0

vendor:mozillamodel:thunderbird esrscope:ltversion:10.0.11

Trust: 1.0

vendor:mozillamodel:firefoxscope:ltversion:17.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.3

Trust: 1.0

vendor:mozillamodel:thunderbird esrscope:gteversion:10.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:5.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:ltversion:2.14

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.11

Trust: 0.9

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.5

Trust: 0.9

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.6

Trust: 0.9

vendor:mozillamodel:seamonkeyscope:eqversion:2.5

Trust: 0.9

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.13

Trust: 0.9

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.14

Trust: 0.9

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.12

Trust: 0.9

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.2

Trust: 0.9

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.6

Trust: 0.9

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.1

Trust: 0.9

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.11

Trust: 0.8

vendor:mozillamodel:thunderbird esrscope:ltversion:10.x

Trust: 0.8

vendor:mozillamodel:firefox esrscope:eqversion:10.0.11

Trust: 0.8

vendor:mozillamodel:firefox esrscope:ltversion:10.x

Trust: 0.8

vendor:mozillamodel:thunderbirdscope:eqversion:13.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.9

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.8

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:2.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.19

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.7

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:11.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.4

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:firefox beta6scope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.12

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.16

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.7.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.4.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:13.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.20

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:12.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.1

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.9

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.5

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.3

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.9

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:12.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.3

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.11

Trust: 0.3

vendor:mozillamodel:firefox rc3scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:1.51

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.1

Trust: 0.3

vendor:mozillamodel:firefox beta8scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.16

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.6

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.11

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.17

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.0.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:12.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.24

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.19

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:2.02

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.19

Trust: 0.3

vendor:mozillamodel:seamonkey alpha2scope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.10

Trust: 0.3

vendor:mozillamodel:firefox beta4scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.18

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.10

Trust: 0.3

vendor:mozillamodel:thunderbird betascope:eqversion:1.52

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.18

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.23

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.1

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:neversion:10.0.11

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16.0.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.26

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:12.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.27

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.024

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.2

Trust: 0.3

vendor:mozillamodel:thunderbird betascope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:15

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.4

Trust: 0.3

vendor:mozillamodel:firefox rc2scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.18

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.6

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.4

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.20

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.25

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.11

Trust: 0.3

vendor:mozillamodel:firefox rcscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.1

Trust: 0.3

vendor:susemodel:linux enterprise server for vmware sp2scope:eqversion:11

Trust: 0.3

vendor:mozillamodel:seamonkey rc2scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox beta1scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.6

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.63

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.22

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.18

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.6.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.8

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.17

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.9

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.3

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.7

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.9

Trust: 0.3

vendor:mozillamodel:seamonkey 2.1b2scope: - version: -

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.15

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.23

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.11

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.6

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:2.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.13.2

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.05

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.7

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.28

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.1

Trust: 0.3

vendor:mozillamodel:seamonkey betascope:eqversion:1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.3

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.62

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp2scope:eqversion:11

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:9.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.4

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.16

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.1

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.7.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.512

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.4

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.3

Trust: 0.3

vendor:mozillamodel:seamonkey alpha1scope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.2

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.03

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.15

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.14

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.22

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.12

Trust: 0.3

vendor:mozillamodel:seamonkey alpha3scope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.5

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:firefox beta9scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0.1

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.19

Trust: 0.3

vendor:mozillamodel:firefox beta5scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.16

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.9

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:seamonkey rc1scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp4scope:eqversion:10

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:1.52

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.7

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.21

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:15.0.1

Trust: 0.3

vendor:mozillamodel:firefox beta7scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.8

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.8

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.02

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:17.0

Trust: 0.3

vendor:redhatmodel:enterprise linux optional productivity application serverscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.8

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:2.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.020

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.3

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.8

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.13.1

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:2.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.10

Trust: 0.3

vendor:mozillamodel:firefox esrscope:neversion:10.0.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.8

Trust: 0.3

vendor:mozillamodel:seamonkey alphascope:eqversion:2.01

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.13

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:11.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:14.0

Trust: 0.3

vendor:mozillamodel:seamonkey devscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.11

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.20

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.21

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp4scope:eqversion:10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.16

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:17.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.19

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.99

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.7

Trust: 0.3

sources: BID: 56641 // JVNDB: JVNDB-2012-005468 // CNNVD: CNNVD-201211-412 // NVD: CVE-2012-5830

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5830
value: HIGH

Trust: 1.0

NVD: CVE-2012-5830
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201211-412
value: MEDIUM

Trust: 0.6

VULHUB: VHN-59111
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-5830
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-59111
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2012-5830
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-59111 // JVNDB: JVNDB-2012-005468 // CNNVD: CNNVD-201211-412 // NVD: CVE-2012-5830

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-59111 // JVNDB: JVNDB-2012-005468 // NVD: CVE-2012-5830

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201211-412

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201211-412

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005468

PATCH

title:MFSA2012-106url:http://www.mozilla.org/security/announce/2012/mfsa2012-106.html

Trust: 0.8

title:MFSA2012-106url:http://www.mozilla-japan.org/security/announce/2012/mfsa2012-106.html

Trust: 0.8

title:openSUSE-SU-2012:1586url:http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html

Trust: 0.8

title:openSUSE-SU-2012:1585url:http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html

Trust: 0.8

title:openSUSE-SU-2012:1583url:http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html

Trust: 0.8

title:RHSA-2012:1482url:https://rhn.redhat.com/errata/RHSA-2012-1482.html

Trust: 0.8

title:RHSA-2012:1483url:https://rhn.redhat.com/errata/RHSA-2012-1483.html

Trust: 0.8

title:USN-1638-1url:http://www.ubuntu.com/usn/USN-1638-1/

Trust: 0.8

sources: JVNDB: JVNDB-2012-005468

EXTERNAL IDS

db:NVDid:CVE-2012-5830

Trust: 3.1

db:SECUNIAid:51360

Trust: 1.7

db:SECUNIAid:51359

Trust: 1.7

db:SECUNIAid:51381

Trust: 1.7

db:SECUNIAid:51434

Trust: 1.1

db:SECUNIAid:51440

Trust: 1.1

db:SECUNIAid:51369

Trust: 1.1

db:SECUNIAid:51439

Trust: 1.1

db:SECUNIAid:51370

Trust: 1.1

db:OSVDBid:87598

Trust: 1.1

db:JVNDBid:JVNDB-2012-005468

Trust: 0.8

db:CNNVDid:CNNVD-201211-412

Trust: 0.7

db:SECUNIAid:51382

Trust: 0.7

db:SECUNIAid:51358

Trust: 0.6

db:BIDid:56641

Trust: 0.4

db:VULHUBid:VHN-59111

Trust: 0.1

db:PACKETSTORMid:118290

Trust: 0.1

db:PACKETSTORMid:118248

Trust: 0.1

db:PACKETSTORMid:118247

Trust: 0.1

db:PACKETSTORMid:119293

Trust: 0.1

sources: VULHUB: VHN-59111 // BID: 56641 // JVNDB: JVNDB-2012-005468 // PACKETSTORM: 118290 // PACKETSTORM: 118248 // PACKETSTORM: 118247 // PACKETSTORM: 119293 // CNNVD: CNNVD-201211-412 // NVD: CVE-2012-5830

REFERENCES

url:http://www.mozilla.org/security/announce/2012/mfsa2012-106.html

Trust: 2.0

url:https://bugzilla.mozilla.org/show_bug.cgi?id=775228

Trust: 1.7

url:http://secunia.com/advisories/51359

Trust: 1.7

url:http://secunia.com/advisories/51360

Trust: 1.7

url:http://secunia.com/advisories/51381

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2012-1482.html

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2012-1483.html

Trust: 1.2

url:http://osvdb.org/87598

Trust: 1.1

url:http://secunia.com/advisories/51369

Trust: 1.1

url:http://secunia.com/advisories/51370

Trust: 1.1

url:http://secunia.com/advisories/51434

Trust: 1.1

url:http://secunia.com/advisories/51439

Trust: 1.1

url:http://secunia.com/advisories/51440

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-1636-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-1638-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-1638-2

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-1638-3

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/80183

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5830

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5830

Trust: 0.8

url:http://secunia.com/advisories/51358

Trust: 0.6

url:http://secunia.com/advisories/51382

Trust: 0.6

url:http://software.cisco.com/download/navigator.html?mdfid=281787278

Trust: 0.3

url:http://www.mozilla.org/projects/seamonkey/

Trust: 0.3

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-0676

Trust: 0.3

url:https://www.redhat.com/security/data/cve/cve-2012-5830.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-4214.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-5840.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5839

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-4215.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5830

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-4201

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-4209.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-4202.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-4202

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-5839.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-4207

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-5841.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-5835.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-5833.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-5842.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-4216

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-4215

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5842

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5841

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5835

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-4214

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-5829.html

Trust: 0.2

url:https://access.redhat.com/knowledge/articles/11258

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-4201.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5840

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-4216.html

Trust: 0.2

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5829

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-4209

Trust: 0.2

url:http://bugzilla.redhat.com/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5833

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-4207.html

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51382

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/51382/#comments

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/51382/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4210

Trust: 0.1

url:http://www.mozilla.org/security/known-vulnerabilities/firefoxesr.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-4210.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1965

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3985

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0079

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4688

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0082

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2371

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0169

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4061

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1210

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4181

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1832

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1994

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4058

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1828

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0353

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3975

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2766

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4061

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3767

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0473

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0172

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1971

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0479

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2043

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3175

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3973

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3655

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2760

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1961

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0447

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2462

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2770

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3958

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3777

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3003

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3174

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0168

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0057

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0443

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2993

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3376

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5017

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3555

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1940

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2989

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0182

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4179

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2436

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3072

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1208

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3967

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2375

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2376

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3971

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3772

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3977

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3965

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3978

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1834

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2472

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3378

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2767

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1952

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0078

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0170

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0164

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0775

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3400

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1211

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3372

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2769

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4188

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5012

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4206

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5354

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5504

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3648

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0776

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0477

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2467

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0475

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3962

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2408

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1304

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4201

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4182

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1206

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3990

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1975

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1392

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2044

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3183

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3835

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5507

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4059

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5023

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1308

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1044

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5508

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0654

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0070

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4065

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1307

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3866

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0080

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2984

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0478

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1213

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0352

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5014

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2664

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0051

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3989

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3984

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3371

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3382

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4180

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4582

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5502

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2437

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3978

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3993

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5506

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3375

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3078

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0173

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3075

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3969

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0462

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2605

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1169

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1311

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3658

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1973

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3004

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1950

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1972

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2369

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1215

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4216

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4062

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0463

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3001

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0167

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3381

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3988

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2374

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3994

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1960

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1963

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3167

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0774

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4065

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5022

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5024

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0468

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3026

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1203

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2061

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0085

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3980

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1966

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1945

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1959

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4060

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0077

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3000

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1974

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0016

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2065

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0081

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4063

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1955

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1302

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5503

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3374

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3968

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1028

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4059

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3005

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4185

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2986

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0176

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1121

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3661

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2765

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5913

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3169

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5843

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3663

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3651

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5016

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2372

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1951

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3274

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1197

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3964

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1953

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2997

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3778

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2996

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3232

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0061

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4063

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2654

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0354

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5500

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3380

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1212

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0357

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1976

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0773

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0220

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0777

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0055

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5052

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0165

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2464

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2378

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3131

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0160

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5513

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3986

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0367

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2752

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3388

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2753

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3650

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3002

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2764

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3983

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2751

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4190

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2477

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1833

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3389

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2981

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2768

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2991

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0358

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2373

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3670

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3987

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3976

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4582

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3377

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4208

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1956

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4186

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0441

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0054

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5014

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2671

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2662

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1309

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3957

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1585

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1207

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0445

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2998

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0355

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1200

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2362

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3077

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0056

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2987

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3101

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5501

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4195

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4209

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3985

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1962

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3660

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2762

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5833

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2988

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0648

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3101

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3168

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0072

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2995

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3399

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0171

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2983

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5841

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5019

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2985

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0458

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3659

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0174

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5842

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3176

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5511

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0356

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4205

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0178

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3379

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4064

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4508

Trust: 0.1

url:http://www.mozilla.org/security/announce/2011/mfsa2011-34.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1310

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0016

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1967

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1306

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3079

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2471

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0474

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0444

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0455

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1954

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4062

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3647

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4210

Trust: 0.1

url:http://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-c=

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0017

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1305

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0446

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3966

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0181

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5013

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3979

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1214

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1196

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0449

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0062

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1841

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3179

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0367

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3765

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1947

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4060

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3992

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1563

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0442

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0175

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1712

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1199

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2365

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2404

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3775

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1198

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2535

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1938

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5505

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1946

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5512

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-5074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3766

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2437

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1949

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3776

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5830

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0075

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0652

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1958

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5015

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0163

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0179

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1313

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0159

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1939

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3972

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3182

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4207

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-6961

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2990

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3970

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3178

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3180

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4191

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3956

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4204

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2763

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2982

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3986

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3654

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2364

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3389

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2980

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3963

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0464

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1209

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2754

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2210

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3982

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3173

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3774

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3995

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5510

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4192

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2463

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0467

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1964

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3959

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3770

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3769

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0772

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3665

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4196

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5822

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2466

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3649

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3653

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3768

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2478

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3988

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1312

Trust: 0.1

url:http://www.mozilla.org/security/announce/2011/mfsa2011-11.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0058

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3771

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2479

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3383

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1303

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2465

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3170

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2377

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3991

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3982

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5012

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1957

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2755

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1948

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3961

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3773

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3076

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0166

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1571

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3984

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3640

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4064

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2436

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3981

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1970

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0461

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4215

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4058

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0451

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0771

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5013

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4212

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0076

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0083

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1201

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3960

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0059

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0177

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3062

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5018

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3177

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3980

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2363

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0084

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3652

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1941

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201301-01.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1937

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0053

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3171

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2999

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0471

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0065

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0162

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3373

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2665

Trust: 0.1

sources: VULHUB: VHN-59111 // BID: 56641 // JVNDB: JVNDB-2012-005468 // PACKETSTORM: 118290 // PACKETSTORM: 118248 // PACKETSTORM: 118247 // PACKETSTORM: 119293 // CNNVD: CNNVD-201211-412 // NVD: CVE-2012-5830

CREDITS

miaubiz

Trust: 0.3

sources: BID: 56641

SOURCES

db:VULHUBid:VHN-59111
db:BIDid:56641
db:JVNDBid:JVNDB-2012-005468
db:PACKETSTORMid:118290
db:PACKETSTORMid:118248
db:PACKETSTORMid:118247
db:PACKETSTORMid:119293
db:CNNVDid:CNNVD-201211-412
db:NVDid:CVE-2012-5830

LAST UPDATE DATE

2024-11-23T20:45:38.650000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-59111date:2020-08-13T00:00:00
db:BIDid:56641date:2015-04-13T21:43:00
db:JVNDBid:JVNDB-2012-005468date:2016-02-16T00:00:00
db:CNNVDid:CNNVD-201211-412date:2012-11-22T00:00:00
db:NVDid:CVE-2012-5830date:2024-11-21T01:45:19.537

SOURCES RELEASE DATE

db:VULHUBid:VHN-59111date:2012-11-21T00:00:00
db:BIDid:56641date:2012-11-20T00:00:00
db:JVNDBid:JVNDB-2012-005468date:2012-11-22T00:00:00
db:PACKETSTORMid:118290date:2012-11-23T08:19:48
db:PACKETSTORMid:118248date:2012-11-20T23:57:23
db:PACKETSTORMid:118247date:2012-11-20T23:57:07
db:PACKETSTORMid:119293date:2013-01-08T03:21:24
db:CNNVDid:CNNVD-201211-412date:2012-11-22T00:00:00
db:NVDid:CVE-2012-5830date:2012-11-21T12:55:03.290