mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 01:02:55 +00:00
132 lines
4.7 KiB
JSON
132 lines
4.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2012-1973",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=773207",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=773207"
|
|
},
|
|
{
|
|
"name": "DSA-2556",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2012/dsa-2556"
|
|
},
|
|
{
|
|
"name": "RHSA-2012:1211",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html"
|
|
},
|
|
{
|
|
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html"
|
|
},
|
|
{
|
|
"name": "DSA-2553",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2012/dsa-2553"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:17045",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17045"
|
|
},
|
|
{
|
|
"name": "55316",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/55316"
|
|
},
|
|
{
|
|
"name": "USN-1548-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "http://www.ubuntu.com/usn/USN-1548-1"
|
|
},
|
|
{
|
|
"name": "USN-1548-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "http://www.ubuntu.com/usn/USN-1548-2"
|
|
},
|
|
{
|
|
"name": "RHSA-2012:1210",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2012:1167",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html"
|
|
},
|
|
{
|
|
"name": "DSA-2554",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2012/dsa-2554"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2012:1157",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2012:1065",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html"
|
|
},
|
|
{
|
|
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
|
}
|
|
]
|
|
}
|
|
} |