mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
535 lines
19 KiB
JSON
535 lines
19 KiB
JSON
{
|
|
"id": "CVE-2004-0905",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2004-09-14T04:00:00.000",
|
|
"lastModified": "2024-11-20T23:49:38.940",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in another domain."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 4.6,
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93C142C5-3A85-432B-80D6-2E7B1B4694F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2434FCE7-A50B-4527-9970-C7224B31141C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5633FB6E-D623-49D4-9858-4E20E64DE458"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "429ECA02-DBCD-45FB-942C-CA4BC1BC8A72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "567FF916-7DE0-403C-8528-7931A43E0D18"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCDAEAE6-BA9F-4D40-B264-4A72930239E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9296197-0EE0-4CC0-A11F-E44E3443E990"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A76ACC55-754D-4501-8312-5A4E10D053B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8987151-0901-4547-B750-5DC470BB9CF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53E60BCC-6D1C-489E-9F3B-9BE42B46704F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66A87ED8-9E1F-4C2C-B806-A41765081C9C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C795D86F-9B08-41FE-B82B-5BBB3DE6357D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2637D552-4A3D-4867-B52A-ACCED8681AF4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7CC237C8-CFE0-4128-B549-93CD16894E71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B8EA79A-8426-44CF-AF13-58F7EF8B6D88"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "367A5D46-0FF3-4140-9478-251363822E9C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CAA58EE9-05C7-4395-A8A4-5F54BE4C5DAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C656A621-BE62-4BB8-9B25-A3916E60FA12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8DE4889-424F-4A44-8C14-9F18821CE961"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D3F91A1-7DD9-4146-8BA4-BE594C66DD30"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82A6419D-0E94-4D80-8B07-E5AB4DBA2F28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1003D688-3EEA-45F9-BB2C-5BAB395D7678"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED69BEB9-8D83-415B-826D-9D17FB67976B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9AE678D7-812D-4C55-91B0-F3AC6BE0CD58"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCDB64E5-AE26-43DF-8A66-654D5D22A635"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BF63077-4E98-497D-8CE6-B84B022DB21D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FCEAEDEB-0EE7-4221-B9B8-65438580D331"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "150F1B28-0FAB-4880-B1D5-7F244A1C4D31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FE7EA3B-3BF8-4696-9488-78506074D62D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCFD7AF7-0FE9-4F56-98B0-60FC7F7F1B78"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:netscape:navigator:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "30A0231A-B664-46C2-9602-B60EAD6AEC12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:netscape:navigator:7.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C632D06D-0172-46DA-A7F9-0BC484365BD7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:netscape:navigator:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C1BC491-9C5A-46D5-B6C3-5A8E5A1A0AF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:netscape:navigator:7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "842CBD30-B4BA-4FCF-9152-9DBEBE59857C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4007B0D-9606-46BD-866A-7911BEA292BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A35FC777-A34E-4C7B-9E93-8F17F3AD5180"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
|
|
"matchCriteriaId": "2641EE56-6F9D-400B-B456-877F4DA79B10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
|
|
"matchCriteriaId": "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
|
|
"matchCriteriaId": "E0B458EA-495E-40FA-9379-C03757F7B1EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
|
|
"matchCriteriaId": "409E324A-C040-494F-A026-9DCAE01C07F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
|
|
"matchCriteriaId": "1728AB5D-55A9-46B0-A412-6F7263CAEB5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
|
|
"matchCriteriaId": "6474B775-C893-491F-A074-802AFB1FEDD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
|
|
"matchCriteriaId": "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
|
|
"matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
|
|
"matchCriteriaId": "0EFE2E73-9536-41A9-B83B-0A06B54857F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C84296C-2C8A-4DCD-9751-52951F8BEA9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "138985E6-5107-4E8B-A801-C3D5FE075227"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*",
|
|
"matchCriteriaId": "9B502A61-44FB-4CD4-85BE-88D4ACCCA441"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:linux:7.3:*:i686:*:*:*:*:*",
|
|
"matchCriteriaId": "05853955-CA81-40D3-9A70-1227F3270D3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*",
|
|
"matchCriteriaId": "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
|
|
"matchCriteriaId": "84A50ED3-FD0D-4038-B3E7-CC65D166C968"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
|
|
"matchCriteriaId": "777F9EC0-2919-45CA-BFF8-78A02537C513"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
|
|
"matchCriteriaId": "C7EAAD04-D7C4-43DE-B488-1AAD014B503E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
|
|
"matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8C55338-3372-413F-82E3-E1B476D6F41A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
|
|
"matchCriteriaId": "F7446746-87B7-4BD3-AABF-1E0FAA8265AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
|
|
"matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFABFCE5-4F86-4AE8-9849-BC360AC72098"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=250862",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=109698896104418&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=109900315219363&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://security.gentoo.org/glsa/glsa-200409-26.xml",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/651928",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.novell.com/linux/security/advisories/2004_36_mozilla.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/11177",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA04-261A.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17374",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=250862",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=109698896104418&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=109900315219363&w=2",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://security.gentoo.org/glsa/glsa-200409-26.xml",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/651928",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.novell.com/linux/security/advisories/2004_36_mozilla.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/11177",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA04-261A.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17374",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |