ID CVE-2018-5129
Summary A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
References
Vulnerable Configurations
  • Debian Linux 7.0
    cpe:2.3:o:debian:debian_linux:7.0
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
  • Mozilla Firefox
    cpe:2.3:a:mozilla:firefox
  • Mozilla Firefox 0.1
    cpe:2.3:a:mozilla:firefox:0.1
  • Mozilla Firefox 0.2
    cpe:2.3:a:mozilla:firefox:0.2
  • Mozilla Firefox 0.3
    cpe:2.3:a:mozilla:firefox:0.3
  • Mozilla Firefox 0.4
    cpe:2.3:a:mozilla:firefox:0.4
  • Mozilla Firefox 0.5
    cpe:2.3:a:mozilla:firefox:0.5
  • Mozilla Firefox 0.6
    cpe:2.3:a:mozilla:firefox:0.6
  • Mozilla Firefox 0.6.1
    cpe:2.3:a:mozilla:firefox:0.6.1
  • Mozilla Firefox 0.7
    cpe:2.3:a:mozilla:firefox:0.7
  • Mozilla Firefox 0.7.1
    cpe:2.3:a:mozilla:firefox:0.7.1
  • Mozilla Firefox 0.8
    cpe:2.3:a:mozilla:firefox:0.8
  • Mozilla Firefox 0.9
    cpe:2.3:a:mozilla:firefox:0.9
  • Mozilla Firefox 0.9 rc
    cpe:2.3:a:mozilla:firefox:0.9:rc
  • Mozilla Firefox 0.9.1
    cpe:2.3:a:mozilla:firefox:0.9.1
  • Mozilla Firefox 0.9.2
    cpe:2.3:a:mozilla:firefox:0.9.2
  • Mozilla Firefox 0.9.3
    cpe:2.3:a:mozilla:firefox:0.9.3
  • Mozilla Firefox 0.10
    cpe:2.3:a:mozilla:firefox:0.10
  • Mozilla Firefox 0.10.1
    cpe:2.3:a:mozilla:firefox:0.10.1
  • Mozilla Firefox 1.0
    cpe:2.3:a:mozilla:firefox:1.0
  • Mozilla Firefox 1.0 Preview Release
    cpe:2.3:a:mozilla:firefox:1.0:preview_release
  • Mozilla Firefox 1.0.1
    cpe:2.3:a:mozilla:firefox:1.0.1
  • Mozilla Firefox 1.0.2
    cpe:2.3:a:mozilla:firefox:1.0.2
  • Mozilla Firefox 1.0.3
    cpe:2.3:a:mozilla:firefox:1.0.3
  • Mozilla Firefox 1.0.4
    cpe:2.3:a:mozilla:firefox:1.0.4
  • Mozilla Firefox 1.0.5
    cpe:2.3:a:mozilla:firefox:1.0.5
  • Mozilla Firefox 1.0.6
    cpe:2.3:a:mozilla:firefox:1.0.6
  • Mozilla Firefox 1.0.7
    cpe:2.3:a:mozilla:firefox:1.0.7
  • Mozilla Firefox 1.0.8
    cpe:2.3:a:mozilla:firefox:1.0.8
  • Mozilla Firefox 1.4.1
    cpe:2.3:a:mozilla:firefox:1.4.1
  • Mozilla Firefox 1.5
    cpe:2.3:a:mozilla:firefox:1.5
  • Mozilla Firefox 1.5 Beta 1
    cpe:2.3:a:mozilla:firefox:1.5:beta1
  • Mozilla Firefox 1.5 Beta 2
    cpe:2.3:a:mozilla:firefox:1.5:beta2
  • Mozilla Firefox 1.5.0.1
    cpe:2.3:a:mozilla:firefox:1.5.0.1
  • Mozilla Firefox 1.5.0.2
    cpe:2.3:a:mozilla:firefox:1.5.0.2
  • Mozilla Firefox 1.5.0.3
    cpe:2.3:a:mozilla:firefox:1.5.0.3
  • Mozilla Firefox 1.5.0.4
    cpe:2.3:a:mozilla:firefox:1.5.0.4
  • Mozilla Firefox 1.5.0.5
    cpe:2.3:a:mozilla:firefox:1.5.0.5
  • Mozilla Firefox 1.5.0.6
    cpe:2.3:a:mozilla:firefox:1.5.0.6
  • Mozilla Firefox 1.5.0.7
    cpe:2.3:a:mozilla:firefox:1.5.0.7
  • Mozilla Firefox 1.5.0.8
    cpe:2.3:a:mozilla:firefox:1.5.0.8
  • Mozilla Firefox 1.5.0.9
    cpe:2.3:a:mozilla:firefox:1.5.0.9
  • Mozilla Firefox 1.5.0.10
    cpe:2.3:a:mozilla:firefox:1.5.0.10
  • Mozilla Firefox 1.5.0.11
    cpe:2.3:a:mozilla:firefox:1.5.0.11
  • Mozilla Firefox 1.5.0.12
    cpe:2.3:a:mozilla:firefox:1.5.0.12
  • Mozilla Firefox 1.5.1
    cpe:2.3:a:mozilla:firefox:1.5.1
  • Mozilla Firefox 1.5.2
    cpe:2.3:a:mozilla:firefox:1.5.2
  • Mozilla Firefox 1.5.3
    cpe:2.3:a:mozilla:firefox:1.5.3
  • Mozilla Firefox 1.5.4
    cpe:2.3:a:mozilla:firefox:1.5.4
  • Mozilla Firefox 1.5.5
    cpe:2.3:a:mozilla:firefox:1.5.5
  • Mozilla Firefox 1.5.6
    cpe:2.3:a:mozilla:firefox:1.5.6
  • Mozilla Firefox 1.5.7
    cpe:2.3:a:mozilla:firefox:1.5.7
  • Mozilla Firefox 1.5.8
    cpe:2.3:a:mozilla:firefox:1.5.8
  • Mozilla Firefox 1.8
    cpe:2.3:a:mozilla:firefox:1.8
  • Mozilla Firefox 2.0
    cpe:2.3:a:mozilla:firefox:2.0
  • Mozilla Firefox 2.0.0.1
    cpe:2.3:a:mozilla:firefox:2.0.0.1
  • Mozilla Firefox 2.0.0.2
    cpe:2.3:a:mozilla:firefox:2.0.0.2
  • Mozilla Firefox 2.0.0.3
    cpe:2.3:a:mozilla:firefox:2.0.0.3
  • Mozilla Firefox 2.0.0.4
    cpe:2.3:a:mozilla:firefox:2.0.0.4
  • Mozilla Firefox 2.0.0.5
    cpe:2.3:a:mozilla:firefox:2.0.0.5
  • Mozilla Firefox 2.0.0.6
    cpe:2.3:a:mozilla:firefox:2.0.0.6
  • Mozilla Firefox 2.0.0.7
    cpe:2.3:a:mozilla:firefox:2.0.0.7
  • Mozilla Firefox 2.0.0.8
    cpe:2.3:a:mozilla:firefox:2.0.0.8
  • Mozilla Firefox 2.0.0.9
    cpe:2.3:a:mozilla:firefox:2.0.0.9
  • Mozilla Firefox 2.0.0.10
    cpe:2.3:a:mozilla:firefox:2.0.0.10
  • Mozilla Firefox 2.0.0.11
    cpe:2.3:a:mozilla:firefox:2.0.0.11
  • Mozilla Firefox 2.0.0.12
    cpe:2.3:a:mozilla:firefox:2.0.0.12
  • Mozilla Firefox 2.0.0.13
    cpe:2.3:a:mozilla:firefox:2.0.0.13
  • Mozilla Firefox 2.0.0.14
    cpe:2.3:a:mozilla:firefox:2.0.0.14
  • Mozilla Firefox 2.0.0.15
    cpe:2.3:a:mozilla:firefox:2.0.0.15
  • Mozilla Firefox 2.0.0.16
    cpe:2.3:a:mozilla:firefox:2.0.0.16
  • Mozilla Firefox 2.0.0.17
    cpe:2.3:a:mozilla:firefox:2.0.0.17
  • Mozilla Firefox 2.0.0.18
    cpe:2.3:a:mozilla:firefox:2.0.0.18
  • Mozilla Firefox 2.0.0.19
    cpe:2.3:a:mozilla:firefox:2.0.0.19
  • Mozilla Firefox 2.0.0.20
    cpe:2.3:a:mozilla:firefox:2.0.0.20
  • Mozilla Firefox 3.0
    cpe:2.3:a:mozilla:firefox:3.0
  • Mozilla Firefox 3.0.1
    cpe:2.3:a:mozilla:firefox:3.0.1
  • Mozilla Firefox 3.0.2
    cpe:2.3:a:mozilla:firefox:3.0.2
  • Mozilla Firefox 3.0.3
    cpe:2.3:a:mozilla:firefox:3.0.3
  • Mozilla Firefox 3.0.4
    cpe:2.3:a:mozilla:firefox:3.0.4
  • Mozilla Firefox 3.0.5
    cpe:2.3:a:mozilla:firefox:3.0.5
  • Mozilla Firefox 3.0.6
    cpe:2.3:a:mozilla:firefox:3.0.6
  • Mozilla Firefox 3.0.7
    cpe:2.3:a:mozilla:firefox:3.0.7
  • Mozilla Firefox 3.0.8
    cpe:2.3:a:mozilla:firefox:3.0.8
  • Mozilla Firefox 3.0.9
    cpe:2.3:a:mozilla:firefox:3.0.9
  • Mozilla Firefox 3.0.10
    cpe:2.3:a:mozilla:firefox:3.0.10
  • Mozilla Firefox 3.0.11
    cpe:2.3:a:mozilla:firefox:3.0.11
  • Mozilla Firefox 3.0.12
    cpe:2.3:a:mozilla:firefox:3.0.12
  • Mozilla Firefox 3.0.13
    cpe:2.3:a:mozilla:firefox:3.0.13
  • Mozilla Firefox 3.0.14
    cpe:2.3:a:mozilla:firefox:3.0.14
  • Mozilla Firefox 3.0.15
    cpe:2.3:a:mozilla:firefox:3.0.15
  • Mozilla Firefox 3.0.16
    cpe:2.3:a:mozilla:firefox:3.0.16
  • Mozilla Firefox 3.0.17
    cpe:2.3:a:mozilla:firefox:3.0.17
  • Mozilla Firefox 3.0.18
    cpe:2.3:a:mozilla:firefox:3.0.18
  • Mozilla Firefox 3.0.19
    cpe:2.3:a:mozilla:firefox:3.0.19
  • Mozilla Firefox 3.5
    cpe:2.3:a:mozilla:firefox:3.5
  • Mozilla Firefox 3.5.1
    cpe:2.3:a:mozilla:firefox:3.5.1
  • Mozilla Firefox 3.5.2
    cpe:2.3:a:mozilla:firefox:3.5.2
  • Mozilla Firefox 3.5.3
    cpe:2.3:a:mozilla:firefox:3.5.3
  • Mozilla Firefox 3.5.4
    cpe:2.3:a:mozilla:firefox:3.5.4
  • Mozilla Firefox 3.5.5
    cpe:2.3:a:mozilla:firefox:3.5.5
  • Mozilla Firefox 3.5.6
    cpe:2.3:a:mozilla:firefox:3.5.6
  • Mozilla Firefox 3.5.7
    cpe:2.3:a:mozilla:firefox:3.5.7
  • Mozilla Firefox 3.5.8
    cpe:2.3:a:mozilla:firefox:3.5.8
  • Mozilla Firefox 3.5.9
    cpe:2.3:a:mozilla:firefox:3.5.9
  • Mozilla Firefox 3.5.10
    cpe:2.3:a:mozilla:firefox:3.5.10
  • Mozilla Firefox 3.5.11
    cpe:2.3:a:mozilla:firefox:3.5.11
  • Mozilla Firefox 3.5.12
    cpe:2.3:a:mozilla:firefox:3.5.12
  • Mozilla Firefox 3.5.13
    cpe:2.3:a:mozilla:firefox:3.5.13
  • Mozilla Firefox 3.5.14
    cpe:2.3:a:mozilla:firefox:3.5.14
  • Mozilla Firefox 3.5.15
    cpe:2.3:a:mozilla:firefox:3.5.15
  • Mozilla Firefox 3.5.16
    cpe:2.3:a:mozilla:firefox:3.5.16
  • Mozilla Firefox 3.5.17
    cpe:2.3:a:mozilla:firefox:3.5.17
  • Mozilla Firefox 3.5.18
    cpe:2.3:a:mozilla:firefox:3.5.18
  • Mozilla Firefox 3.5.19
    cpe:2.3:a:mozilla:firefox:3.5.19
  • Mozilla Firefox 3.6
    cpe:2.3:a:mozilla:firefox:3.6
  • Mozilla Firefox 3.6.2
    cpe:2.3:a:mozilla:firefox:3.6.2
  • Mozilla Firefox 3.6.3
    cpe:2.3:a:mozilla:firefox:3.6.3
  • Mozilla Firefox 3.6.4
    cpe:2.3:a:mozilla:firefox:3.6.4
  • Mozilla Firefox 3.6.6
    cpe:2.3:a:mozilla:firefox:3.6.6
  • Mozilla Firefox 3.6.7
    cpe:2.3:a:mozilla:firefox:3.6.7
  • Mozilla Firefox 3.6.8
    cpe:2.3:a:mozilla:firefox:3.6.8
  • Mozilla Firefox 3.6.9
    cpe:2.3:a:mozilla:firefox:3.6.9
  • Mozilla Firefox 3.6.10
    cpe:2.3:a:mozilla:firefox:3.6.10
  • Mozilla Firefox 3.6.11
    cpe:2.3:a:mozilla:firefox:3.6.11
  • Mozilla Firefox 3.6.12
    cpe:2.3:a:mozilla:firefox:3.6.12
  • Mozilla Firefox 3.6.13
    cpe:2.3:a:mozilla:firefox:3.6.13
  • Mozilla Firefox 3.6.14
    cpe:2.3:a:mozilla:firefox:3.6.14
  • Mozilla Firefox 3.6.15
    cpe:2.3:a:mozilla:firefox:3.6.15
  • Mozilla Firefox 3.6.16
    cpe:2.3:a:mozilla:firefox:3.6.16
  • Mozilla Firefox 3.6.17
    cpe:2.3:a:mozilla:firefox:3.6.17
  • Mozilla Firefox 3.6.18
    cpe:2.3:a:mozilla:firefox:3.6.18
  • Mozilla Firefox 3.6.19
    cpe:2.3:a:mozilla:firefox:3.6.19
  • Mozilla Firefox 3.6.20
    cpe:2.3:a:mozilla:firefox:3.6.20
  • Mozilla Firefox 3.6.21
    cpe:2.3:a:mozilla:firefox:3.6.21
  • Mozilla Firefox 3.6.22
    cpe:2.3:a:mozilla:firefox:3.6.22
  • Mozilla Firefox 3.6.23
    cpe:2.3:a:mozilla:firefox:3.6.23
  • Mozilla Firefox 3.6.24
    cpe:2.3:a:mozilla:firefox:3.6.24
  • Mozilla Firefox 3.6.25
    cpe:2.3:a:mozilla:firefox:3.6.25
  • Mozilla Firefox 3.6.26
    cpe:2.3:a:mozilla:firefox:3.6.26
  • Mozilla Firefox 3.6.27
    cpe:2.3:a:mozilla:firefox:3.6.27
  • Mozilla Firefox 3.6.28
    cpe:2.3:a:mozilla:firefox:3.6.28
  • Mozilla Firefox 4.0
    cpe:2.3:a:mozilla:firefox:4.0
  • Mozilla Firefox 4.0 beta1
    cpe:2.3:a:mozilla:firefox:4.0:beta1
  • Mozilla Firefox 4.0 beta10
    cpe:2.3:a:mozilla:firefox:4.0:beta10
  • Mozilla Firefox 4.0 beta11
    cpe:2.3:a:mozilla:firefox:4.0:beta11
  • Mozilla Firefox 4.0 beta12
    cpe:2.3:a:mozilla:firefox:4.0:beta12
  • Mozilla Firefox 4.0 beta2
    cpe:2.3:a:mozilla:firefox:4.0:beta2
  • Mozilla Firefox 4.0 beta3
    cpe:2.3:a:mozilla:firefox:4.0:beta3
  • Mozilla Firefox 4.0 beta4
    cpe:2.3:a:mozilla:firefox:4.0:beta4
  • Mozilla Firefox 4.0 beta5
    cpe:2.3:a:mozilla:firefox:4.0:beta5
  • Mozilla Firefox 4.0 beta6
    cpe:2.3:a:mozilla:firefox:4.0:beta6
  • Mozilla Firefox 4.0 beta7
    cpe:2.3:a:mozilla:firefox:4.0:beta7
  • Mozilla Firefox 4.0 beta8
    cpe:2.3:a:mozilla:firefox:4.0:beta8
  • Mozilla Firefox 4.0 beta9
    cpe:2.3:a:mozilla:firefox:4.0:beta9
  • Mozilla Firefox 4.0.1
    cpe:2.3:a:mozilla:firefox:4.0.1
  • Mozilla Firefox 5.0
    cpe:2.3:a:mozilla:firefox:5.0
  • Mozilla Firefox 5.0.1
    cpe:2.3:a:mozilla:firefox:5.0.1
  • Mozilla Firefox 6.0
    cpe:2.3:a:mozilla:firefox:6.0
  • Mozilla Firefox 6.0.1
    cpe:2.3:a:mozilla:firefox:6.0.1
  • Mozilla Firefox 6.0.2
    cpe:2.3:a:mozilla:firefox:6.0.2
  • Mozilla Firefox 7.0
    cpe:2.3:a:mozilla:firefox:7.0
  • Mozilla Firefox 7.0.1
    cpe:2.3:a:mozilla:firefox:7.0.1
  • Mozilla Firefox 8.0
    cpe:2.3:a:mozilla:firefox:8.0
  • Mozilla Firefox 8.0.1
    cpe:2.3:a:mozilla:firefox:8.0.1
  • Mozilla Firefox 9.0
    cpe:2.3:a:mozilla:firefox:9.0
  • Mozilla Firefox 9.0.1
    cpe:2.3:a:mozilla:firefox:9.0.1
  • Mozilla Firefox 10.0
    cpe:2.3:a:mozilla:firefox:10.0
  • Mozilla Firefox 10.0.1
    cpe:2.3:a:mozilla:firefox:10.0.1
  • Mozilla Firefox 10.0.2
    cpe:2.3:a:mozilla:firefox:10.0.2
  • Mozilla Firefox 10.0.3
    cpe:2.3:a:mozilla:firefox:10.0.3
  • Mozilla Firefox 10.0.4
    cpe:2.3:a:mozilla:firefox:10.0.4
  • Mozilla Firefox 10.0.5
    cpe:2.3:a:mozilla:firefox:10.0.5
  • Mozilla Firefox 10.0.6
    cpe:2.3:a:mozilla:firefox:10.0.6
  • Mozilla Firefox 10.0.7
    cpe:2.3:a:mozilla:firefox:10.0.7
  • Mozilla Firefox 10.0.8
    cpe:2.3:a:mozilla:firefox:10.0.8
  • Mozilla Firefox 10.0.9
    cpe:2.3:a:mozilla:firefox:10.0.9
  • Mozilla Firefox 10.0.10
    cpe:2.3:a:mozilla:firefox:10.0.10
  • Mozilla Firefox 10.0.11
    cpe:2.3:a:mozilla:firefox:10.0.11
  • Mozilla Firefox 10.0.12
    cpe:2.3:a:mozilla:firefox:10.0.12
  • Mozilla Firefox 11.0
    cpe:2.3:a:mozilla:firefox:11.0
  • Mozilla Firefox 12.0
    cpe:2.3:a:mozilla:firefox:12.0
  • Mozilla Firefox 12.0 beta6
    cpe:2.3:a:mozilla:firefox:12.0:beta6
  • Mozilla Firefox 13.0
    cpe:2.3:a:mozilla:firefox:13.0
  • Mozilla Firefox 13.0.1
    cpe:2.3:a:mozilla:firefox:13.0.1
  • Mozilla Firefox 14.0
    cpe:2.3:a:mozilla:firefox:14.0
  • Mozilla Firefox 14.0.1
    cpe:2.3:a:mozilla:firefox:14.0.1
  • Mozilla Firefox 15.0
    cpe:2.3:a:mozilla:firefox:15.0
  • Mozilla Firefox 15.0.1
    cpe:2.3:a:mozilla:firefox:15.0.1
  • Mozilla Firefox 16.0
    cpe:2.3:a:mozilla:firefox:16.0
  • Mozilla Firefox 16.0.1
    cpe:2.3:a:mozilla:firefox:16.0.1
  • Mozilla Firefox 16.0.2
    cpe:2.3:a:mozilla:firefox:16.0.2
  • Mozilla Firefox 17.0
    cpe:2.3:a:mozilla:firefox:17.0
  • Mozilla Firefox 17.0.1
    cpe:2.3:a:mozilla:firefox:17.0.1
  • Mozilla Firefox 17.0.2
    cpe:2.3:a:mozilla:firefox:17.0.2
  • Mozilla Firefox 17.0.3
    cpe:2.3:a:mozilla:firefox:17.0.3
  • Mozilla Firefox 17.0.4
    cpe:2.3:a:mozilla:firefox:17.0.4
  • Mozilla Firefox 17.0.5
    cpe:2.3:a:mozilla:firefox:17.0.5
  • Mozilla Firefox 17.0.6
    cpe:2.3:a:mozilla:firefox:17.0.6
  • Mozilla Firefox 17.0.7
    cpe:2.3:a:mozilla:firefox:17.0.7
  • Mozilla Firefox 17.0.8
    cpe:2.3:a:mozilla:firefox:17.0.8
  • Mozilla Firefox 17.0.9
    cpe:2.3:a:mozilla:firefox:17.0.9
  • Mozilla Firefox 17.0.10
    cpe:2.3:a:mozilla:firefox:17.0.10
  • Mozilla Firefox 17.0.11
    cpe:2.3:a:mozilla:firefox:17.0.11
  • Mozilla Firefox 18.0
    cpe:2.3:a:mozilla:firefox:18.0
  • Mozilla Firefox 18.0.1
    cpe:2.3:a:mozilla:firefox:18.0.1
  • Mozilla Firefox 18.0.2
    cpe:2.3:a:mozilla:firefox:18.0.2
  • Mozilla Firefox 19.0
    cpe:2.3:a:mozilla:firefox:19.0
  • Mozilla Firefox 19.0.1
    cpe:2.3:a:mozilla:firefox:19.0.1
  • Mozilla Firefox 19.0.2
    cpe:2.3:a:mozilla:firefox:19.0.2
  • Mozilla Firefox 20.0
    cpe:2.3:a:mozilla:firefox:20.0
  • Mozilla Firefox 20.0.1
    cpe:2.3:a:mozilla:firefox:20.0.1
  • Mozilla Firefox 21.0
    cpe:2.3:a:mozilla:firefox:21.0
  • Mozilla Firefox 22.0
    cpe:2.3:a:mozilla:firefox:22.0
  • Mozilla Firefox 23.0
    cpe:2.3:a:mozilla:firefox:23.0
  • Mozilla Firefox 23.0.1
    cpe:2.3:a:mozilla:firefox:23.0.1
  • Mozilla Firefox 24.0
    cpe:2.3:a:mozilla:firefox:24.0
  • Mozilla Firefox 24.1
    cpe:2.3:a:mozilla:firefox:24.1
  • Mozilla Firefox 24.1.0
    cpe:2.3:a:mozilla:firefox:24.1.0
  • Mozilla Firefox 24.1.1
    cpe:2.3:a:mozilla:firefox:24.1.1
  • Mozilla Firefox 24.2.0
    cpe:2.3:a:mozilla:firefox:24.2.0
  • Mozilla Firefox 24.3.0
    cpe:2.3:a:mozilla:firefox:24.3.0
  • Mozilla Firefox 24.4.0
    cpe:2.3:a:mozilla:firefox:24.4.0
  • Mozilla Firefox 24.5.0
    cpe:2.3:a:mozilla:firefox:24.5.0
  • Mozilla Firefox 24.6.0
    cpe:2.3:a:mozilla:firefox:24.6.0
  • Mozilla Firefox 24.7.0
    cpe:2.3:a:mozilla:firefox:24.7.0
  • Mozilla Firefox 24.8.0
    cpe:2.3:a:mozilla:firefox:24.8.0
  • Mozilla Firefox 24.8.1
    cpe:2.3:a:mozilla:firefox:24.8.1
  • Mozilla Firefox 25.0
    cpe:2.3:a:mozilla:firefox:25.0
  • Mozilla Firefox 25.0.1
    cpe:2.3:a:mozilla:firefox:25.0.1
  • Mozilla Firefox 26.0
    cpe:2.3:a:mozilla:firefox:26.0
  • Mozilla Firefox 27.0
    cpe:2.3:a:mozilla:firefox:27.0
  • Mozilla Firefox 27.0.1
    cpe:2.3:a:mozilla:firefox:27.0.1
  • Mozilla Firefox 28.0
    cpe:2.3:a:mozilla:firefox:28.0
  • Mozilla Firefox 29.0
    cpe:2.3:a:mozilla:firefox:29.0
  • Mozilla Firefox 29.0.1
    cpe:2.3:a:mozilla:firefox:29.0.1
  • Mozilla Firefox 30.0
    cpe:2.3:a:mozilla:firefox:30.0
  • Mozilla Firefox 31.0
    cpe:2.3:a:mozilla:firefox:31.0
  • Mozilla Firefox 31.1.0
    cpe:2.3:a:mozilla:firefox:31.1.0
  • Mozilla Firefox 31.1.1
    cpe:2.3:a:mozilla:firefox:31.1.1
  • Mozilla Firefox 31.2.0
    cpe:2.3:a:mozilla:firefox:31.2.0
  • Mozilla Firefox 31.3.0
    cpe:2.3:a:mozilla:firefox:31.3.0
  • Mozilla Firefox 31.4.0
    cpe:2.3:a:mozilla:firefox:31.4.0
  • Mozilla Firefox 31.5.0
    cpe:2.3:a:mozilla:firefox:31.5.0
  • Mozilla Firefox 31.5.2
    cpe:2.3:a:mozilla:firefox:31.5.2
  • Mozilla Firefox 31.5.3
    cpe:2.3:a:mozilla:firefox:31.5.3
  • Mozilla Firefox 31.6.0
    cpe:2.3:a:mozilla:firefox:31.6.0
  • Mozilla Firefox 31.7.0
    cpe:2.3:a:mozilla:firefox:31.7.0
  • Mozilla Firefox 31.8.0
    cpe:2.3:a:mozilla:firefox:31.8.0
  • Mozilla Firefox 32.0
    cpe:2.3:a:mozilla:firefox:32.0
  • Mozilla Firefox 32.0.1
    cpe:2.3:a:mozilla:firefox:32.0.1
  • Mozilla Firefox 32.0.2
    cpe:2.3:a:mozilla:firefox:32.0.2
  • Mozilla Firefox 32.0.3
    cpe:2.3:a:mozilla:firefox:32.0.3
  • Mozilla Firefox 33.0
    cpe:2.3:a:mozilla:firefox:33.0
  • Mozilla Firefox 33.0.1
    cpe:2.3:a:mozilla:firefox:33.0.1
  • Mozilla Firefox 33.0.2
    cpe:2.3:a:mozilla:firefox:33.0.2
  • Mozilla Firefox 33.0.3
    cpe:2.3:a:mozilla:firefox:33.0.3
  • Mozilla Firefox 33.1
    cpe:2.3:a:mozilla:firefox:33.1
  • Mozilla Firefox 33.1.1
    cpe:2.3:a:mozilla:firefox:33.1.1
  • Mozilla Firefox 34.0
    cpe:2.3:a:mozilla:firefox:34.0
  • Mozilla Firefox 34.0.5
    cpe:2.3:a:mozilla:firefox:34.0.5
  • Mozilla Firefox 35.0
    cpe:2.3:a:mozilla:firefox:35.0
  • Mozilla Firefox 35.0.1
    cpe:2.3:a:mozilla:firefox:35.0.1
  • Mozilla Firefox 36.0
    cpe:2.3:a:mozilla:firefox:36.0
  • Mozilla Firefox 36.0.1
    cpe:2.3:a:mozilla:firefox:36.0.1
  • Mozilla Firefox 36.0.3
    cpe:2.3:a:mozilla:firefox:36.0.3
  • Mozilla Firefox 36.0.4
    cpe:2.3:a:mozilla:firefox:36.0.4
  • Mozilla Firefox 37.0
    cpe:2.3:a:mozilla:firefox:37.0
  • Mozilla Firefox 37.0.1
    cpe:2.3:a:mozilla:firefox:37.0.1
  • Mozilla Firefox 37.0.2
    cpe:2.3:a:mozilla:firefox:37.0.2
  • Mozilla Firefox 38.0
    cpe:2.3:a:mozilla:firefox:38.0
  • Mozilla Firefox 38.0.1
    cpe:2.3:a:mozilla:firefox:38.0.1
  • Mozilla Firefox 38.0.5
    cpe:2.3:a:mozilla:firefox:38.0.5
  • Mozilla Firefox 38.1.0
    cpe:2.3:a:mozilla:firefox:38.1.0
  • Mozilla Firefox 38.1.1
    cpe:2.3:a:mozilla:firefox:38.1.1
  • Mozilla Firefox 38.2.0
    cpe:2.3:a:mozilla:firefox:38.2.0
  • Mozilla Firefox 38.2.1
    cpe:2.3:a:mozilla:firefox:38.2.1
  • Mozilla Firefox 38.3.0
    cpe:2.3:a:mozilla:firefox:38.3.0
  • Mozilla Firefox 38.4.0
    cpe:2.3:a:mozilla:firefox:38.4.0
  • Mozilla Firefox 38.5.0
    cpe:2.3:a:mozilla:firefox:38.5.0
  • Mozilla Firefox 38.5.1
    cpe:2.3:a:mozilla:firefox:38.5.1
  • Mozilla Firefox 38.5.2
    cpe:2.3:a:mozilla:firefox:38.5.2
  • Mozilla Firefox 38.6.0
    cpe:2.3:a:mozilla:firefox:38.6.0
  • Mozilla Firefox 38.6.1
    cpe:2.3:a:mozilla:firefox:38.6.1
  • Mozilla Firefox 38.7.0
    cpe:2.3:a:mozilla:firefox:38.7.0
  • Mozilla Firefox 38.7.1
    cpe:2.3:a:mozilla:firefox:38.7.1
  • Mozilla Firefox 38.8.0
    cpe:2.3:a:mozilla:firefox:38.8.0
  • Mozilla Firefox 39.0
    cpe:2.3:a:mozilla:firefox:39.0
  • Mozilla Firefox 39.0.3
    cpe:2.3:a:mozilla:firefox:39.0.3
  • Mozilla Firefox 40.0
    cpe:2.3:a:mozilla:firefox:40.0
  • Mozilla Firefox 40.0.2
    cpe:2.3:a:mozilla:firefox:40.0.2
  • Mozilla Firefox 40.0.3
    cpe:2.3:a:mozilla:firefox:40.0.3
  • Mozilla Firefox 41.0
    cpe:2.3:a:mozilla:firefox:41.0
  • Mozilla Firefox 41.0.1
    cpe:2.3:a:mozilla:firefox:41.0.1
  • Mozilla Firefox 41.0.2
    cpe:2.3:a:mozilla:firefox:41.0.2
  • Mozilla Firefox 42.0
    cpe:2.3:a:mozilla:firefox:42.0
  • Mozilla Firefox 42.0 (64 bit)
    cpe:2.3:a:mozilla:firefox:42.0:-:-:-:-:-:x64
  • Mozilla Firefox 43.0
    cpe:2.3:a:mozilla:firefox:43.0
  • Mozilla Firefox 43.0.1
    cpe:2.3:a:mozilla:firefox:43.0.1
  • Mozilla Firefox 43.0.2
    cpe:2.3:a:mozilla:firefox:43.0.2
  • Mozilla Firefox 43.0.3
    cpe:2.3:a:mozilla:firefox:43.0.3
  • Mozilla Firefox 43.0.4
    cpe:2.3:a:mozilla:firefox:43.0.4
  • Mozilla Firefox 44.0
    cpe:2.3:a:mozilla:firefox:44.0
  • Mozilla Firefox 44.0.1
    cpe:2.3:a:mozilla:firefox:44.0.1
  • Mozilla Firefox 44.0.2
    cpe:2.3:a:mozilla:firefox:44.0.2
  • Mozilla Firefox 45.0
    cpe:2.3:a:mozilla:firefox:45.0
  • Mozilla Firefox 45.0.1
    cpe:2.3:a:mozilla:firefox:45.0.1
  • Mozilla Firefox 45.0.2
    cpe:2.3:a:mozilla:firefox:45.0.2
  • Mozilla Firefox 45.1.1
    cpe:2.3:a:mozilla:firefox:45.1.1
  • Mozilla Firefox 45.2.0
    cpe:2.3:a:mozilla:firefox:45.2.0
  • Mozilla Firefox 45.3.0
    cpe:2.3:a:mozilla:firefox:45.3.0
  • Mozilla Firefox 45.4.0
    cpe:2.3:a:mozilla:firefox:45.4.0
  • Mozilla Firefox 45.5.0
    cpe:2.3:a:mozilla:firefox:45.5.0
  • Mozilla Firefox 45.5.1
    cpe:2.3:a:mozilla:firefox:45.5.1
  • Mozilla Firefox 45.6.0
    cpe:2.3:a:mozilla:firefox:45.6.0
  • Mozilla Firefox 45.7.0
    cpe:2.3:a:mozilla:firefox:45.7.0
  • Mozilla Firefox 45.8.0
    cpe:2.3:a:mozilla:firefox:45.8.0
  • Mozilla Firefox 45.9.0
    cpe:2.3:a:mozilla:firefox:45.9.0
  • Mozilla Firefox 46.0
    cpe:2.3:a:mozilla:firefox:46.0
  • Mozilla Firefox 46.0.1
    cpe:2.3:a:mozilla:firefox:46.0.1
  • Mozilla Firefox 47.0
    cpe:2.3:a:mozilla:firefox:47.0
  • Mozilla Firefox 47.0.1
    cpe:2.3:a:mozilla:firefox:47.0.1
  • Mozilla Firefox 47.0.2
    cpe:2.3:a:mozilla:firefox:47.0.2
  • Mozilla Firefox 48.0
    cpe:2.3:a:mozilla:firefox:48.0
  • Mozilla Firefox 48.0.1
    cpe:2.3:a:mozilla:firefox:48.0.1
  • Mozilla Firefox 48.0.2
    cpe:2.3:a:mozilla:firefox:48.0.2
  • Mozilla Firefox 49.0
    cpe:2.3:a:mozilla:firefox:49.0
  • Mozilla Firefox 49.0.1
    cpe:2.3:a:mozilla:firefox:49.0.1
  • Mozilla Firefox 49.0.2
    cpe:2.3:a:mozilla:firefox:49.0.2
  • Mozilla Firefox 50.0
    cpe:2.3:a:mozilla:firefox:50.0
  • Mozilla Firefox 50.0.1
    cpe:2.3:a:mozilla:firefox:50.0.1
  • Mozilla Firefox 50.0.2
    cpe:2.3:a:mozilla:firefox:50.0.2
  • Mozilla Firefox 51.0
    cpe:2.3:a:mozilla:firefox:51.0
  • Mozilla Firefox 51.0.1
    cpe:2.3:a:mozilla:firefox:51.0.1
  • Mozilla Firefox 52.0
    cpe:2.3:a:mozilla:firefox:52.0
  • Mozilla Firefox 52.0.1
    cpe:2.3:a:mozilla:firefox:52.0.1
  • Mozilla Firefox 52.0.2
    cpe:2.3:a:mozilla:firefox:52.0.2
  • Mozilla Firefox 52.1.0
    cpe:2.3:a:mozilla:firefox:52.1.0
  • Mozilla Firefox 52.1.1
    cpe:2.3:a:mozilla:firefox:52.1.1
  • Mozilla Firefox 52.1.2
    cpe:2.3:a:mozilla:firefox:52.1.2
  • Mozilla Firefox 52.2.0
    cpe:2.3:a:mozilla:firefox:52.2.0
  • Mozilla Firefox 52.2.1
    cpe:2.3:a:mozilla:firefox:52.2.1
  • Mozilla Firefox 52.3.0
    cpe:2.3:a:mozilla:firefox:52.3.0
  • Mozilla Firefox 52.4.0
    cpe:2.3:a:mozilla:firefox:52.4.0
  • Mozilla Firefox 52.4.1
    cpe:2.3:a:mozilla:firefox:52.4.1
  • Mozilla Firefox 52.5.0
    cpe:2.3:a:mozilla:firefox:52.5.0
  • Mozilla Firefox 52.5.2
    cpe:2.3:a:mozilla:firefox:52.5.2
  • Mozilla Firefox 52.5.3
    cpe:2.3:a:mozilla:firefox:52.5.3
  • Mozilla Firefox 52.6.0
    cpe:2.3:a:mozilla:firefox:52.6.0
  • Mozilla Firefox 52.7.0
    cpe:2.3:a:mozilla:firefox:52.7.0
  • Mozilla Firefox 52.7.1
    cpe:2.3:a:mozilla:firefox:52.7.1
  • Mozilla Firefox 52.7.2
    cpe:2.3:a:mozilla:firefox:52.7.2
  • Mozilla Firefox 52.7.3
    cpe:2.3:a:mozilla:firefox:52.7.3
  • Mozilla Firefox 52.7.4
    cpe:2.3:a:mozilla:firefox:52.7.4
  • Mozilla Firefox 52.8.0
    cpe:2.3:a:mozilla:firefox:52.8.0
  • Mozilla Firefox 52.8.1
    cpe:2.3:a:mozilla:firefox:52.8.1
  • Mozilla Firefox 52.9.0
    cpe:2.3:a:mozilla:firefox:52.9.0
  • Mozilla Firefox 53.0
    cpe:2.3:a:mozilla:firefox:53.0
  • Mozilla Firefox 53.0.2
    cpe:2.3:a:mozilla:firefox:53.0.2
  • Mozilla Firefox 53.0.3
    cpe:2.3:a:mozilla:firefox:53.0.3
  • Mozilla Firefox 54.0
    cpe:2.3:a:mozilla:firefox:54.0
  • Mozilla Firefox 54.0.1
    cpe:2.3:a:mozilla:firefox:54.0.1
  • Mozilla Firefox 55.0
    cpe:2.3:a:mozilla:firefox:55.0
  • Mozilla Firefox 55.0.1
    cpe:2.3:a:mozilla:firefox:55.0.1
  • Mozilla Firefox 55.0.2
    cpe:2.3:a:mozilla:firefox:55.0.2
  • Mozilla Firefox 55.0.3
    cpe:2.3:a:mozilla:firefox:55.0.3
  • Mozilla Firefox 56.0
    cpe:2.3:a:mozilla:firefox:56.0
  • Mozilla Firefox 56.0.1
    cpe:2.3:a:mozilla:firefox:56.0.1
  • Mozilla Firefox 56.0.2
    cpe:2.3:a:mozilla:firefox:56.0.2
  • Mozilla Firefox 57.0
    cpe:2.3:a:mozilla:firefox:57.0
  • Mozilla Firefox 57.0.1
    cpe:2.3:a:mozilla:firefox:57.0.1
  • Mozilla Firefox 57.0.2
    cpe:2.3:a:mozilla:firefox:57.0.2
  • Mozilla Firefox 57.0.3
    cpe:2.3:a:mozilla:firefox:57.0.3
  • Mozilla Firefox 57.0.4
    cpe:2.3:a:mozilla:firefox:57.0.4
  • Mozilla Firefox 58.0
    cpe:2.3:a:mozilla:firefox:58.0
  • Mozilla Firefox 58.0.1
    cpe:2.3:a:mozilla:firefox:58.0.1
  • Mozilla Firefox 58.0.2
    cpe:2.3:a:mozilla:firefox:58.0.2
  • Mozilla Firefox Extended Support Release (ESR) 10.0
    cpe:2.3:a:mozilla:firefox_esr:10.0
  • Mozilla Firefox Extended Support Release (ESR) 10.1
    cpe:2.3:a:mozilla:firefox_esr:10.0.1
  • Mozilla Firefox Extended Support Release (ESR) 10.0.2
    cpe:2.3:a:mozilla:firefox_esr:10.0.2
  • Mozilla Firefox Extended Support Release (ESR) 10.0.3
    cpe:2.3:a:mozilla:firefox_esr:10.0.3
  • Mozilla Firefox Extended Support Release (ESR) 10.0.4
    cpe:2.3:a:mozilla:firefox_esr:10.0.4
  • Mozilla Firefox Extended Support Release (ESR) 10.0.5
    cpe:2.3:a:mozilla:firefox_esr:10.0.5
  • Mozilla Firefox Extended Support Release (ESR) 10.0.6
    cpe:2.3:a:mozilla:firefox_esr:10.0.6
  • Mozilla Firefox Extended Support Release (ESR) 10.0.7
    cpe:2.3:a:mozilla:firefox_esr:10.0.7
  • Mozilla Firefox Extended Support Release (ESR) 10.0.8
    cpe:2.3:a:mozilla:firefox_esr:10.0.8
  • Mozilla Firefox Extended Support Release (ESR) 10.0.9
    cpe:2.3:a:mozilla:firefox_esr:10.0.9
  • Mozilla Firefox Extended Support Release (ESR) 10.0.10
    cpe:2.3:a:mozilla:firefox_esr:10.0.10
  • Mozilla Firefox Extended Support Release (ESR) 10.0.11
    cpe:2.3:a:mozilla:firefox_esr:10.0.11
  • Mozilla Firefox Extended Support Release (ESR) 10.0.12
    cpe:2.3:a:mozilla:firefox_esr:10.0.12
  • Mozilla Firefox Extended Support Release (ESR) 17.0
    cpe:2.3:a:mozilla:firefox_esr:17.0
  • Mozilla Firefox Extended Support Release (ESR) 17.0.1
    cpe:2.3:a:mozilla:firefox_esr:17.0.1
  • Mozilla Firefox Extended Support Release (ESR) 17.0.2
    cpe:2.3:a:mozilla:firefox_esr:17.0.2
  • Mozilla Firefox Extended Support Release (ESR) 17.0.3
    cpe:2.3:a:mozilla:firefox_esr:17.0.3
  • Mozilla Firefox Extended Support Release (ESR) 17.0.4
    cpe:2.3:a:mozilla:firefox_esr:17.0.4
  • Mozilla Firefox Extended Support Release (ESR) 17.0.5
    cpe:2.3:a:mozilla:firefox_esr:17.0.5
  • Mozilla Firefox Extended Support Release (ESR) 17.0.6
    cpe:2.3:a:mozilla:firefox_esr:17.0.6
  • Mozilla Firefox Extended Support Release (ESR) 17.0.7
    cpe:2.3:a:mozilla:firefox_esr:17.0.7
  • Mozilla Firefox Extended Support Release (ESR) 17.0.8
    cpe:2.3:a:mozilla:firefox_esr:17.0.8
  • Mozilla Firefox Extended Support Release (ESR) 17.0.9
    cpe:2.3:a:mozilla:firefox_esr:17.0.9
  • Mozilla Firefox Extended Support Release (ESR) 17.0.10
    cpe:2.3:a:mozilla:firefox_esr:17.0.10
  • Mozilla Firefox Extended Support Release (ESR) 17.0.11
    cpe:2.3:a:mozilla:firefox_esr:17.0.11
  • Mozilla Firefox Extended Support Release (ESR) 24.0
    cpe:2.3:a:mozilla:firefox_esr:24.0
  • Mozilla Firefox Extended Support Release (ESR) 24.0.1
    cpe:2.3:a:mozilla:firefox_esr:24.0.1
  • Mozilla Firefox Extended Support Release (ESR) 24.0.2
    cpe:2.3:a:mozilla:firefox_esr:24.0.2
  • Mozilla Firefox Extended Support Release (ESR) 24.1.0
    cpe:2.3:a:mozilla:firefox_esr:24.1.0
  • Mozilla Firefox Extended Support Release (ESR) 24.1.1
    cpe:2.3:a:mozilla:firefox_esr:24.1.1
  • Mozilla Firefox Extended Support Release (ESR) 24.2
    cpe:2.3:a:mozilla:firefox_esr:24.2
  • Mozilla Firefox Extended Support Release (ESR) 24.3
    cpe:2.3:a:mozilla:firefox_esr:24.3
  • Mozilla Firefox Extended Support Release (ESR) 24.4
    cpe:2.3:a:mozilla:firefox_esr:24.4
  • Mozilla Firefox Extended Support Release (ESR) 24.5
    cpe:2.3:a:mozilla:firefox_esr:24.5
  • Mozilla Firefox Extended Support Release (ESR) 24.6
    cpe:2.3:a:mozilla:firefox_esr:24.6
  • Mozilla Firefox Extended Support Release (ESR) 24.7
    cpe:2.3:a:mozilla:firefox_esr:24.7
  • Mozilla Firefox Extended Support Release (ESR) 24.8
    cpe:2.3:a:mozilla:firefox_esr:24.8
  • Mozilla Firefox Extended Support Release (ESR) 31.0
    cpe:2.3:a:mozilla:firefox_esr:31.0
  • Mozilla Firefox Extended Support Release (ESR) 31.1
    cpe:2.3:a:mozilla:firefox_esr:31.1
  • Mozilla Firefox Extended Support Release (ESR) 31.1.0
    cpe:2.3:a:mozilla:firefox_esr:31.1.0
  • Mozilla Firefox Extended Support Release (ESR) 31.1.1
    cpe:2.3:a:mozilla:firefox_esr:31.1.1
  • Mozilla Firefox Extended Support Release (ESR) 31.2
    cpe:2.3:a:mozilla:firefox_esr:31.2
  • Mozilla Firefox Extended Support Release (ESR) 31.3
    cpe:2.3:a:mozilla:firefox_esr:31.3
  • Mozilla Firefox Extended Support Release (ESR) 31.3.0
    cpe:2.3:a:mozilla:firefox_esr:31.3.0
  • Mozilla Firefox Extended Support Release (ESR) 31.4
    cpe:2.3:a:mozilla:firefox_esr:31.4
  • Mozilla Firefox Extended Support Release (ESR) 31.5
    cpe:2.3:a:mozilla:firefox_esr:31.5
  • Mozilla Firefox Extended Support Release (ESR) 31.5.1
    cpe:2.3:a:mozilla:firefox_esr:31.5.1
  • Mozilla Firefox Extended Support Release (ESR) 31.5.2
    cpe:2.3:a:mozilla:firefox_esr:31.5.2
  • Mozilla Firefox Extended Support Release (ESR) 31.5.3
    cpe:2.3:a:mozilla:firefox_esr:31.5.3
  • Mozilla Firefox Extended Support Release (ESR) 31.6
    cpe:2.3:a:mozilla:firefox_esr:31.6
  • Mozilla Firefox Extended Support Release (ESR) 31.8
    cpe:2.3:a:mozilla:firefox_esr:31.8
  • Mozilla Firefox ESR 38.0
    cpe:2.3:a:mozilla:firefox_esr:38.0
  • Mozilla Firefox ESR 38.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.0.1
    cpe:2.3:a:mozilla:firefox_esr:38.0.1
  • Mozilla Firefox ESR 38.0.1 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.0.1:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.0.5
    cpe:2.3:a:mozilla:firefox_esr:38.0.5
  • Mozilla Firefox ESR 38.0.5 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.0.5:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.1.0
    cpe:2.3:a:mozilla:firefox_esr:38.1.0
  • Mozilla Firefox ESR 38.1.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.1.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.1.1
    cpe:2.3:a:mozilla:firefox_esr:38.1.1
  • Mozilla Firefox ESR 38.1.1 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.1.1:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.2.0
    cpe:2.3:a:mozilla:firefox_esr:38.2.0
  • Mozilla Firefox ESR 38.2.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.2.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.2.1
    cpe:2.3:a:mozilla:firefox_esr:38.2.1
  • Mozilla Firefox ESR 38.2.1 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.2.1:-:-:-:-:-:x64
  • Mozilla Firefox Extended Support Release (ESR) 38.3.0
    cpe:2.3:a:mozilla:firefox_esr:38.3.0
  • Mozilla Firefox ESR 38.3.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.3.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.4.0
    cpe:2.3:a:mozilla:firefox_esr:38.4.0
  • Mozilla Firefox ESR 38.4.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.4.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.5.0
    cpe:2.3:a:mozilla:firefox_esr:38.5.0
  • Mozilla Firefox ESR 38.5.1
    cpe:2.3:a:mozilla:firefox_esr:38.5.1
  • Mozilla Firefox ESR 38.5.2
    cpe:2.3:a:mozilla:firefox_esr:38.5.2
  • Mozilla Firefox Extended Support Release (ESR) 38.6.0
    cpe:2.3:a:mozilla:firefox_esr:38.6.0
  • Mozilla Firefox Extended Support Release (ESR) 38.6.1
    cpe:2.3:a:mozilla:firefox_esr:38.6.1
  • Mozilla Firefox Extended Support Release (ESR) 38.7.0
    cpe:2.3:a:mozilla:firefox_esr:38.7.0
  • Mozilla Firefox Extended Support Release (ESR) 38.7.1
    cpe:2.3:a:mozilla:firefox_esr:38.7.1
  • Mozilla Firefox ESR 38.8.0
    cpe:2.3:a:mozilla:firefox_esr:38.8.0
  • Mozilla Firefox Extended Support Release (ESR) 45.0.2
    cpe:2.3:a:mozilla:firefox_esr:45.0.2
  • Mozilla Firefox Extended Support Release (ESR) 45.1.0
    cpe:2.3:a:mozilla:firefox_esr:45.1.0
  • Mozilla Firefox Extended Support Release (ESR) 45.1.1
    cpe:2.3:a:mozilla:firefox_esr:45.1.1
  • Mozilla Firefox Extended Support Release (ESR) 45.2.0
    cpe:2.3:a:mozilla:firefox_esr:45.2.0
  • Mozilla Firefox Extended Support Release (ESR) 45.3.0
    cpe:2.3:a:mozilla:firefox_esr:45.3.0
  • Mozilla Firefox ESR 45.4.0
    cpe:2.3:a:mozilla:firefox_esr:45.4.0
  • Mozilla Firefox ESR 45.5.0
    cpe:2.3:a:mozilla:firefox_esr:45.5.0
  • Red Hat Enterprise Linux Desktop 6.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • Red Hat Enterprise Linux Server 6.0
    cpe:2.3:o:redhat:enterprise_linux_server:6.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • Red Hat Enterprise Linux Server Advanced mission critical Update Support (AUS) 7.4
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.4
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.5
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5
  • Red Hat Enterprise Linux Workstation 6.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • Canonical Ubuntu Linux 17.10
    cpe:2.3:o:canonical:ubuntu_linux:17.10
  • Mozilla Thunderbird
    cpe:2.3:a:mozilla:thunderbird
  • Mozilla Thunderbird 0.1
    cpe:2.3:a:mozilla:thunderbird:0.1
  • Mozilla Thunderbird 0.2
    cpe:2.3:a:mozilla:thunderbird:0.2
  • Mozilla Thunderbird 0.3
    cpe:2.3:a:mozilla:thunderbird:0.3
  • Mozilla Thunderbird 0.4
    cpe:2.3:a:mozilla:thunderbird:0.4
  • Mozilla Thunderbird 0.5
    cpe:2.3:a:mozilla:thunderbird:0.5
  • Mozilla Thunderbird 0.6
    cpe:2.3:a:mozilla:thunderbird:0.6
  • Mozilla Thunderbird 0.7
    cpe:2.3:a:mozilla:thunderbird:0.7
  • Mozilla Thunderbird 0.7 Release Candidate
    cpe:2.3:a:mozilla:thunderbird:0.7:rc
  • Mozilla Thunderbird 0.7.1
    cpe:2.3:a:mozilla:thunderbird:0.7.1
  • Mozilla Thunderbird 0.7.2
    cpe:2.3:a:mozilla:thunderbird:0.7.2
  • Mozilla Thunderbird 0.7.3
    cpe:2.3:a:mozilla:thunderbird:0.7.3
  • Mozilla Thunderbird 0.8
    cpe:2.3:a:mozilla:thunderbird:0.8
  • Mozilla Thunderbird 0.9
    cpe:2.3:a:mozilla:thunderbird:0.9
  • Mozilla Thunderbird 1.0
    cpe:2.3:a:mozilla:thunderbird:1.0
  • Mozilla Thunderbird 1.0 Release Candidate
    cpe:2.3:a:mozilla:thunderbird:1.0:rc
  • Mozilla Thunderbird 1.0.2
    cpe:2.3:a:mozilla:thunderbird:1.0.2
  • Mozilla Thunderbird 1.0.5
    cpe:2.3:a:mozilla:thunderbird:1.0.5
  • Mozilla Thunderbird 1.0.6
    cpe:2.3:a:mozilla:thunderbird:1.0.6
  • Mozilla Thunderbird 1.0.7
    cpe:2.3:a:mozilla:thunderbird:1.0.7
  • Mozilla Thunderbird 1.0.8
    cpe:2.3:a:mozilla:thunderbird:1.0.8
  • Mozilla Thunderbird 1.1 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:1.1:alpha1
  • Mozilla Thunderbird 1.1 Alpha 2
    cpe:2.3:a:mozilla:thunderbird:1.1:alpha2
  • Mozilla Thunderbird 1.5
    cpe:2.3:a:mozilla:thunderbird:1.5
  • Mozilla Thunderbird 1.5 Beta 1
    cpe:2.3:a:mozilla:thunderbird:1.5:beta1
  • Mozilla Thunderbird 1.5 Beta 2
    cpe:2.3:a:mozilla:thunderbird:1.5:beta2
  • Mozilla Thunderbird 1.5 Release Candidate 1
    cpe:2.3:a:mozilla:thunderbird:1.5:rc1
  • Mozilla Thunderbird 1.5 Release Candidate 2
    cpe:2.3:a:mozilla:thunderbird:1.5:rc2
  • Mozilla Thunderbird 1.5.0.2
    cpe:2.3:a:mozilla:thunderbird:1.5.0.2
  • Mozilla Thunderbird 1.5.0.4
    cpe:2.3:a:mozilla:thunderbird:1.5.0.4
  • Mozilla Thunderbird 1.5.0.5
    cpe:2.3:a:mozilla:thunderbird:1.5.0.5
  • Mozilla Thunderbird 1.5.0.7
    cpe:2.3:a:mozilla:thunderbird:1.5.0.7
  • Mozilla Thunderbird 1.5.0.8
    cpe:2.3:a:mozilla:thunderbird:1.5.0.8
  • Mozilla Thunderbird 1.5.0.9
    cpe:2.3:a:mozilla:thunderbird:1.5.0.9
  • Mozilla Thunderbird 1.5.0.10
    cpe:2.3:a:mozilla:thunderbird:1.5.0.10
  • Mozilla Thunderbird 1.5.0.12
    cpe:2.3:a:mozilla:thunderbird:1.5.0.12
  • Mozilla Thunderbird 1.5.0.13
    cpe:2.3:a:mozilla:thunderbird:1.5.0.13
  • Mozilla Thunderbird 1.5.0.14
    cpe:2.3:a:mozilla:thunderbird:1.5.0.14
  • Mozilla Thunderbird 2.0
    cpe:2.3:a:mozilla:thunderbird:2.0
  • Mozilla Thunderbird 2.0 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:2.0:alpha1
  • Mozilla Thunderbird 2.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:2.0:beta1
  • Mozilla Thunderbird 2.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:2.0:beta2
  • Mozilla Thunderbird 2.0.0.0
    cpe:2.3:a:mozilla:thunderbird:2.0.0.0
  • Mozilla Thunderbird 2.0.0.0 Release Candidate 1
    cpe:2.3:a:mozilla:thunderbird:2.0.0.0:rc1
  • Mozilla Thunderbird 2.0.0.4
    cpe:2.3:a:mozilla:thunderbird:2.0.0.4
  • Mozilla Thunderbird 2.0.0.5
    cpe:2.3:a:mozilla:thunderbird:2.0.0.5
  • Mozilla Thunderbird 2.0.0.6
    cpe:2.3:a:mozilla:thunderbird:2.0.0.6
  • Mozilla Thunderbird 2.0.0.9
    cpe:2.3:a:mozilla:thunderbird:2.0.0.9
  • Mozilla Thunderbird 2.0.0.12
    cpe:2.3:a:mozilla:thunderbird:2.0.0.12
  • Mozilla Thunderbird 2.0.0.14
    cpe:2.3:a:mozilla:thunderbird:2.0.0.14
  • Mozilla Thunderbird 2.0.0.16
    cpe:2.3:a:mozilla:thunderbird:2.0.0.16
  • Mozilla Thunderbird 2.0.0.17
    cpe:2.3:a:mozilla:thunderbird:2.0.0.17
  • Mozilla Thunderbird 2.0.0.18
    cpe:2.3:a:mozilla:thunderbird:2.0.0.18
  • Mozilla Thunderbird 2.0.0.19
    cpe:2.3:a:mozilla:thunderbird:2.0.0.19
  • Mozilla Thunderbird 2.0.0.21
    cpe:2.3:a:mozilla:thunderbird:2.0.0.21
  • Mozilla Thunderbird 2.0.0.22
    cpe:2.3:a:mozilla:thunderbird:2.0.0.22
  • Mozilla Thunderbird 2.0.0.23
    cpe:2.3:a:mozilla:thunderbird:2.0.0.23
  • Mozilla Thunderbird 2.0.0.24
    cpe:2.3:a:mozilla:thunderbird:2.0.0.24
  • Mozilla Thunderbird 2.0.0.14
    cpe:2.3:a:mozilla:thunderbird:2.0.14
  • Mozilla Thunderbird 3.0
    cpe:2.3:a:mozilla:thunderbird:3.0
  • Mozilla Thunderbird 3.0 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:3.0:alpha1
  • Mozilla Thunderbird 3.0 Alpha 2
    cpe:2.3:a:mozilla:thunderbird:3.0:alpha2
  • Mozilla Thunderbird 3.0 Alpha 3
    cpe:2.3:a:mozilla:thunderbird:3.0:alpha3
  • Mozilla Thunderbird 3.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:3.0:beta1
  • Mozilla Thunderbird 3.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:3.0:beta2
  • Mozilla Thunderbird 3.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:3.0:beta3
  • Mozilla Thunderbird 3.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:3.0:beta4
  • Mozilla Thunderbird 3.0 Release Candidate 1
    cpe:2.3:a:mozilla:thunderbird:3.0:rc1
  • Mozilla Thunderbird 3.0 Release Candidate 2
    cpe:2.3:a:mozilla:thunderbird:3.0:rc2
  • Mozilla Thunderbird 3.0.1
    cpe:2.3:a:mozilla:thunderbird:3.0.1
  • Mozilla Thunderbird 3.0.2
    cpe:2.3:a:mozilla:thunderbird:3.0.2
  • Mozilla Thunderbird 3.0.3
    cpe:2.3:a:mozilla:thunderbird:3.0.3
  • Mozilla Thunderbird 3.0.4
    cpe:2.3:a:mozilla:thunderbird:3.0.4
  • Mozilla Thunderbird 3.0.5
    cpe:2.3:a:mozilla:thunderbird:3.0.5
  • Mozilla Thunderbird 3.0.6
    cpe:2.3:a:mozilla:thunderbird:3.0.6
  • Mozilla Thunderbird 3.0.7
    cpe:2.3:a:mozilla:thunderbird:3.0.7
  • Mozilla Thunderbird 3.0.8
    cpe:2.3:a:mozilla:thunderbird:3.0.8
  • Mozilla Thunderbird 3.0.9
    cpe:2.3:a:mozilla:thunderbird:3.0.9
  • Mozilla Thunderbird 3.0.10
    cpe:2.3:a:mozilla:thunderbird:3.0.10
  • Mozilla Thunderbird 3.0.11
    cpe:2.3:a:mozilla:thunderbird:3.0.11
  • Mozilla Thunderbird 3.1
    cpe:2.3:a:mozilla:thunderbird:3.1
  • Mozilla Thunderbird 3.1 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:3.1:alpha1
  • Mozilla Thunderbird 3.1 Beta 1
    cpe:2.3:a:mozilla:thunderbird:3.1:beta1
  • Mozilla Thunderbird 3.1 Beta 2
    cpe:2.3:a:mozilla:thunderbird:3.1:beta2
  • Mozilla Thunderbird 3.1 Release Candidate 1
    cpe:2.3:a:mozilla:thunderbird:3.1:rc1
  • Mozilla Thunderbird 3.1 Release Candidate 2
    cpe:2.3:a:mozilla:thunderbird:3.1:rc2
  • Mozilla Thunderbird 3.1.1
    cpe:2.3:a:mozilla:thunderbird:3.1.1
  • Mozilla Thunderbird 3.1.2
    cpe:2.3:a:mozilla:thunderbird:3.1.2
  • Mozilla Thunderbird 3.1.3
    cpe:2.3:a:mozilla:thunderbird:3.1.3
  • Mozilla Thunderbird 3.1.4
    cpe:2.3:a:mozilla:thunderbird:3.1.4
  • Mozilla Thunderbird 3.1.5
    cpe:2.3:a:mozilla:thunderbird:3.1.5
  • Mozilla Thunderbird 3.1.6
    cpe:2.3:a:mozilla:thunderbird:3.1.6
  • Mozilla Thunderbird 3.1.7
    cpe:2.3:a:mozilla:thunderbird:3.1.7
  • Mozilla Thunderbird 3.1.8
    cpe:2.3:a:mozilla:thunderbird:3.1.8
  • Mozilla Thunderbird 3.1.9
    cpe:2.3:a:mozilla:thunderbird:3.1.9
  • Mozilla Thunderbird 3.1.10
    cpe:2.3:a:mozilla:thunderbird:3.1.10
  • Mozilla Thunderbird 3.1.11
    cpe:2.3:a:mozilla:thunderbird:3.1.11
  • Mozilla Thunderbird 3.1.12
    cpe:2.3:a:mozilla:thunderbird:3.1.12
  • Mozilla Thunderbird 3.1.13
    cpe:2.3:a:mozilla:thunderbird:3.1.13
  • Mozilla Thunderbird 3.1.14
    cpe:2.3:a:mozilla:thunderbird:3.1.14
  • Mozilla Thunderbird 3.1.15
    cpe:2.3:a:mozilla:thunderbird:3.1.15
  • Mozilla Thunderbird 3.1.16
    cpe:2.3:a:mozilla:thunderbird:3.1.16
  • Mozilla Thunderbird 3.1.17
    cpe:2.3:a:mozilla:thunderbird:3.1.17
  • Mozilla Thunderbird 3.1.18
    cpe:2.3:a:mozilla:thunderbird:3.1.18
  • Mozilla Thunderbird 3.1.19
    cpe:2.3:a:mozilla:thunderbird:3.1.19
  • Mozilla Thunderbird 3.1.20
    cpe:2.3:a:mozilla:thunderbird:3.1.20
  • Mozilla Thunderbird 3.3 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:3.3:alpha1
  • Mozilla Thunderbird 3.3 Alpha 2
    cpe:2.3:a:mozilla:thunderbird:3.3:alpha2
  • Mozilla Thunderbird 3.3 Alpha 3
    cpe:2.3:a:mozilla:thunderbird:3.3:alpha3
  • Mozilla Thunderbird 5.0
    cpe:2.3:a:mozilla:thunderbird:5.0
  • Mozilla Thunderbird 5.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:5.0:beta1
  • Mozilla Thunderbird 5.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:5.0:beta2
  • Mozilla Thunderbird 6.0
    cpe:2.3:a:mozilla:thunderbird:6.0
  • Mozilla Thunderbird 6.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:6.0:beta1
  • Mozilla Thunderbird 6.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:6.0:beta2
  • Mozilla Thunderbird 6.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:6.0:beta3
  • Mozilla Thunderbird 6.0.1
    cpe:2.3:a:mozilla:thunderbird:6.0.1
  • Mozilla Thunderbird 6.0.2
    cpe:2.3:a:mozilla:thunderbird:6.0.2
  • Mozilla Thunderbird 7.0
    cpe:2.3:a:mozilla:thunderbird:7.0
  • Mozilla Thunderbird 7.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:7.0:beta1
  • Mozilla Thunderbird 7.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:7.0:beta2
  • Mozilla Thunderbird 7.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:7.0:beta3
  • Mozilla Thunderbird 7.0.1
    cpe:2.3:a:mozilla:thunderbird:7.0.1
  • Mozilla Thunderbird 8.0
    cpe:2.3:a:mozilla:thunderbird:8.0
  • Mozilla Thunderbird 8.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:8.0:beta1
  • Mozilla Thunderbird 8.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:8.0:beta2
  • Mozilla Thunderbird 8.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:8.0:beta3
  • Mozilla Thunderbird 8.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:8.0:beta4
  • Mozilla Thunderbird 8.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:8.0:beta5
  • Mozilla Thunderbird 9.0
    cpe:2.3:a:mozilla:thunderbird:9.0
  • Mozilla Thunderbird 9.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:9.0:beta1
  • Mozilla Thunderbird 9.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:9.0:beta2
  • Mozilla Thunderbird 9.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:9.0:beta3
  • Mozilla Thunderbird 9.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:9.0:beta4
  • Mozilla Thunderbird 9.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:9.0:beta5
  • Mozilla Thunderbird 9.0.1
    cpe:2.3:a:mozilla:thunderbird:9.0.1
  • Mozilla Thunderbird 10.0
    cpe:2.3:a:mozilla:thunderbird:10.0
  • Mozilla Thunderbird 10.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:10.0:beta1
  • Mozilla Thunderbird 10.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:10.0:beta2
  • Mozilla Thunderbird 10.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:10.0:beta3
  • Mozilla Thunderbird 10.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:10.0:beta4
  • Mozilla Thunderbird 10.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:10.0:beta5
  • Mozilla Thunderbird 10.0.1
    cpe:2.3:a:mozilla:thunderbird:10.0.1
  • Mozilla Thunderbird 10.0.2
    cpe:2.3:a:mozilla:thunderbird:10.0.2
  • Mozilla Thunderbird 11.0
    cpe:2.3:a:mozilla:thunderbird:11.0
  • Mozilla Thunderbird 11.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:11.0:beta1
  • Mozilla Thunderbird 11.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:11.0:beta2
  • Mozilla Thunderbird 11.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:11.0:beta3
  • Mozilla Thunderbird 11.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:11.0:beta4
  • Mozilla Thunderbird 11.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:11.0:beta5
  • Mozilla Thunderbird 11.0.1
    cpe:2.3:a:mozilla:thunderbird:11.0.1
  • Mozilla Thunderbird 12.0
    cpe:2.3:a:mozilla:thunderbird:12.0
  • Mozilla Thunderbird 12.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:12.0:beta1
  • Mozilla Thunderbird 12.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:12.0:beta2
  • Mozilla Thunderbird 12.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:12.0:beta3
  • Mozilla Thunderbird 12.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:12.0:beta4
  • Mozilla Thunderbird 12.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:12.0:beta5
  • Mozilla Thunderbird 12.0.1
    cpe:2.3:a:mozilla:thunderbird:12.0.1
  • Mozilla Thunderbird 13.0
    cpe:2.3:a:mozilla:thunderbird:13.0
  • Mozilla Thunderbird 13.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:13.0:beta1
  • Mozilla Thunderbird 13.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:13.0:beta2
  • Mozilla Thunderbird 13.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:13.0:beta3
  • Mozilla Thunderbird 13.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:13.0:beta4
  • Mozilla Thunderbird 13.0.1
    cpe:2.3:a:mozilla:thunderbird:13.0.1
  • Mozilla Thunderbird 14.0
    cpe:2.3:a:mozilla:thunderbird:14.0
  • Mozilla Thunderbird 14.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:14.0:beta1
  • Mozilla Thunderbird 14.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:14.0:beta2
  • Mozilla Thunderbird 14.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:14.0:beta3
  • Mozilla Thunderbird 14.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:14.0:beta4
  • Mozilla Thunderbird 14.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:14.0:beta5
  • Mozilla Thunderbird 15.0
    cpe:2.3:a:mozilla:thunderbird:15.0
  • Mozilla Thunderbird 15.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:15.0:beta1
  • Mozilla Thunderbird 15.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:15.0:beta2
  • Mozilla Thunderbird 15.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:15.0:beta3
  • Mozilla Thunderbird 15.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:15.0:beta4
  • Mozilla Thunderbird 15.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:15.0:beta5
  • Mozilla Thunderbird 15.0.1
    cpe:2.3:a:mozilla:thunderbird:15.0.1
  • Mozilla Thunderbird 16.0
    cpe:2.3:a:mozilla:thunderbird:16.0
  • Mozilla Thunderbird 16.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:16.0:beta1
  • Mozilla Thunderbird 16.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:16.0:beta2
  • Mozilla Thunderbird 16.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:16.0:beta3
  • Mozilla Thunderbird 16.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:16.0:beta4
  • Mozilla Thunderbird 16.0.1
    cpe:2.3:a:mozilla:thunderbird:16.0.1
  • Mozilla Thunderbird 16.0.2
    cpe:2.3:a:mozilla:thunderbird:16.0.2
  • Mozilla Thunderbird 17.0
    cpe:2.3:a:mozilla:thunderbird:17.0
  • Mozilla Thunderbird 17.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:17.0:beta1
  • Mozilla Thunderbird 17.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:17.0:beta2
  • Mozilla Thunderbird 17.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:17.0:beta3
  • Mozilla Thunderbird 17.0.2
    cpe:2.3:a:mozilla:thunderbird:17.0.2
  • Mozilla Thunderbird 17.0.3
    cpe:2.3:a:mozilla:thunderbird:17.0.3
  • Mozilla Thunderbird 17.0.4
    cpe:2.3:a:mozilla:thunderbird:17.0.4
  • Mozilla Thunderbird 17.0.5
    cpe:2.3:a:mozilla:thunderbird:17.0.5
  • Mozilla Thunderbird 17.0.6
    cpe:2.3:a:mozilla:thunderbird:17.0.6
  • Mozilla Thunderbird 17.0.7
    cpe:2.3:a:mozilla:thunderbird:17.0.7
  • Mozilla Thunderbird 17.0.8
    cpe:2.3:a:mozilla:thunderbird:17.0.8
  • Mozilla Thunderbird 17.0.9
    cpe:2.3:a:mozilla:thunderbird:17.0.9
  • Mozilla Thunderbird 17.0.10
    cpe:2.3:a:mozilla:thunderbird:17.0.10
  • Mozilla Thunderbird 18.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:18.0:beta1
  • Mozilla Thunderbird 19.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:19.0:beta1
  • Mozilla Thunderbird 20.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:20.0:beta1
  • Mozilla Thunderbird 21.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:21.0:beta1
  • Mozilla Thunderbird 22.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:22.0:beta1
  • Mozilla Thunderbird 23.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:23.0:beta1
  • Mozilla Thunderbird 24.0
    cpe:2.3:a:mozilla:thunderbird:24.0
  • Mozilla Thunderbird 24.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:24.0:beta1
  • Mozilla Thunderbird 24.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:24.0:beta2
  • Mozilla Thunderbird 24.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:24.0:beta3
  • Mozilla Thunderbird 24.0.1
    cpe:2.3:a:mozilla:thunderbird:24.0.1
  • Mozilla Thunderbird 24.1.0
    cpe:2.3:a:mozilla:thunderbird:24.1.0
  • Mozilla Thunderbird 24.1.1
    cpe:2.3:a:mozilla:thunderbird:24.1.1
  • Mozilla Thunderbird 24.2.0
    cpe:2.3:a:mozilla:thunderbird:24.2.0
  • Mozilla Thunderbird 24.3.0
    cpe:2.3:a:mozilla:thunderbird:24.3.0
  • Mozilla Thunderbird 24.4.0
    cpe:2.3:a:mozilla:thunderbird:24.4.0
  • Mozilla Thunderbird 24.5.0
    cpe:2.3:a:mozilla:thunderbird:24.5.0
  • Mozilla Thunderbird 24.6.0
    cpe:2.3:a:mozilla:thunderbird:24.6.0
  • Mozilla Thunderbird 24.7.0
    cpe:2.3:a:mozilla:thunderbird:24.7.0
  • Mozilla Thunderbird 24.8.0
    cpe:2.3:a:mozilla:thunderbird:24.8.0
  • Mozilla Thunderbird 24.8.1
    cpe:2.3:a:mozilla:thunderbird:24.8.1
  • Mozilla Thunderbird 25.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:25.0:beta1
  • Mozilla Thunderbird 26.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:26.0:beta1
  • Mozilla Thunderbird 27.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:27.0:beta1
  • Mozilla Thunderbird 28.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:28.0:beta1
  • Mozilla Thunderbird 29.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:29.0:beta1
  • Mozilla Thunderbird 30.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:30.0:beta1
  • Mozilla Thunderbird 31.0
    cpe:2.3:a:mozilla:thunderbird:31.0
  • Mozilla Thunderbird 31.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:31.0:beta1
  • Mozilla Thunderbird 31.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:31.0:beta2
  • Mozilla Thunderbird 31.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:31.0:beta3
  • Mozilla Thunderbird 31.1.0
    cpe:2.3:a:mozilla:thunderbird:31.1.0
  • Mozilla Thunderbird 31.1.1
    cpe:2.3:a:mozilla:thunderbird:31.1.1
  • Mozilla Thunderbird 31.1.2
    cpe:2.3:a:mozilla:thunderbird:31.1.2
  • Mozilla Thunderbird 31.2.0
    cpe:2.3:a:mozilla:thunderbird:31.2.0
  • Mozilla Thunderbird 31.3.0
    cpe:2.3:a:mozilla:thunderbird:31.3.0
  • Mozilla Thunderbird 31.4.0
    cpe:2.3:a:mozilla:thunderbird:31.4.0
  • Mozilla Thunderbird 31.5.0
    cpe:2.3:a:mozilla:thunderbird:31.5.0
  • Mozilla Thunderbird 31.6.0
    cpe:2.3:a:mozilla:thunderbird:31.6.0
  • Mozilla Thunderbird 31.7.0
    cpe:2.3:a:mozilla:thunderbird:31.7.0
  • Mozilla Thunderbird 31.8.0
    cpe:2.3:a:mozilla:thunderbird:31.8.0
  • Mozilla Thunderbird 32.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:32.0:beta1
  • Mozilla Thunderbird 33.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:33.0:beta1
  • Mozilla Thunderbird 34.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:34.0:beta1
  • Mozilla Thunderbird 36.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:36.0:beta1
  • Mozilla Thunderbird 37.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:37.0:beta1
  • Mozilla Thunderbird 38.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:38.0:beta1
  • Mozilla Thunderbird 38.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:38.0:beta2
  • Mozilla Thunderbird 38.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:38.0:beta3
  • Mozilla Thunderbird 38.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:38.0:beta4
  • Mozilla Thunderbird 38.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:38.0:beta5
  • Mozilla Thunderbird 38.0 Beta 6
    cpe:2.3:a:mozilla:thunderbird:38.0:beta6
  • Mozilla Thunderbird 38.0.1
    cpe:2.3:a:mozilla:thunderbird:38.0.1
  • Mozilla Thunderbird 38.1.0
    cpe:2.3:a:mozilla:thunderbird:38.1.0
  • Mozilla Thunderbird 38.2.0
    cpe:2.3:a:mozilla:thunderbird:38.2.0
  • Mozilla Thunderbird 38.3.0
    cpe:2.3:a:mozilla:thunderbird:38.3.0
  • Mozilla Thunderbird 38.4.0
    cpe:2.3:a:mozilla:thunderbird:38.4.0
  • Mozilla Thunderbird 38.5.0
    cpe:2.3:a:mozilla:thunderbird:38.5.0
  • Mozilla Thunderbird 38.5.1
    cpe:2.3:a:mozilla:thunderbird:38.5.1
  • Mozilla Thunderbird 38.6.0
    cpe:2.3:a:mozilla:thunderbird:38.6.0
  • Mozilla Thunderbird 38.7.0
    cpe:2.3:a:mozilla:thunderbird:38.7.0
  • Mozilla Thunderbird 38.7.1
    cpe:2.3:a:mozilla:thunderbird:38.7.1
  • Mozilla Thunderbird 38.7.2
    cpe:2.3:a:mozilla:thunderbird:38.7.2
  • Mozilla Thunderbird 38.8.0
    cpe:2.3:a:mozilla:thunderbird:38.8.0
  • Mozilla Thunderbird 40.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:40.0:beta1
  • Mozilla Thunderbird 41.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:41.0:beta1
  • Mozilla Thunderbird 41.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:41.0:beta2
  • Mozilla Thunderbird 42.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:42.0:beta1
  • Mozilla Thunderbird 42.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:42.0:beta2
  • Mozilla Thunderbird 43.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:43.0:beta1
  • Mozilla Thunderbird 44.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:44.0:beta1
  • Mozilla Thunderbird 45.0
    cpe:2.3:a:mozilla:thunderbird:45.0
  • Mozilla Thunderbird 45.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:45.0:beta1
  • Mozilla Thunderbird 45.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:45.0:beta2
  • Mozilla Thunderbird 45.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:45.0:beta3
  • Mozilla Thunderbird 45.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:45.0:beta4
  • Mozilla Thunderbird 45.1 Beta 1
    cpe:2.3:a:mozilla:thunderbird:45.1:beta1
  • Mozilla Thunderbird 45.1.0
    cpe:2.3:a:mozilla:thunderbird:45.1.0
  • Mozilla Thunderbird 45.1.1
    cpe:2.3:a:mozilla:thunderbird:45.1.1
  • Mozilla Thunderbird 45.2 Beta 1
    cpe:2.3:a:mozilla:thunderbird:45.2:beta1
  • Mozilla Thunderbird 45.2.0
    cpe:2.3:a:mozilla:thunderbird:45.2.0
  • Mozilla Thunderbird 45.3.0
    cpe:2.3:a:mozilla:thunderbird:45.3.0
  • Mozilla Thunderbird 45.4.0
    cpe:2.3:a:mozilla:thunderbird:45.4.0
  • Mozilla Thunderbird 45.5.0
    cpe:2.3:a:mozilla:thunderbird:45.5.0
  • Mozilla Thunderbird 45.5.1
    cpe:2.3:a:mozilla:thunderbird:45.5.1
  • Mozilla Thunderbird 45.6.0
    cpe:2.3:a:mozilla:thunderbird:45.6.0
  • Mozilla Thunderbird 45.7.0
    cpe:2.3:a:mozilla:thunderbird:45.7.0
  • Mozilla Thunderbird 45.7.1
    cpe:2.3:a:mozilla:thunderbird:45.7.1
  • Mozilla Thunderbird 45.8.0
    cpe:2.3:a:mozilla:thunderbird:45.8.0
  • Mozilla Thunderbird 47.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:47.0:beta1
  • Mozilla Thunderbird 47.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:47.0:beta2
  • Mozilla Thunderbird 49.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:49.0:beta1
  • Mozilla Thunderbird 50.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:50.0:beta1
  • Mozilla Thunderbird 50.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:50.0:beta2
  • Mozilla Thunderbird 50.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:50.0:beta3
  • Mozilla Thunderbird 51.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:51.0:beta1
  • Mozilla Thunderbird 51.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:51.0:beta2
  • Mozilla Thunderbird 52.0
    cpe:2.3:a:mozilla:thunderbird:52.0
  • Mozilla Thunderbird 52.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:52.0:beta1
  • Mozilla Thunderbird 52.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:52.0:beta2
  • Mozilla Thunderbird 52.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:52.0:beta3
  • Mozilla Thunderbird 52.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:52.0:beta4
  • Mozilla Thunderbird 52.0.1
    cpe:2.3:a:mozilla:thunderbird:52.0.1
  • Mozilla Thunderbird 52.1.0
    cpe:2.3:a:mozilla:thunderbird:52.1.0
  • Mozilla Thunderbird 52.1.1
    cpe:2.3:a:mozilla:thunderbird:52.1.1
  • Mozilla Thunderbird 52.2.0
    cpe:2.3:a:mozilla:thunderbird:52.2.0
  • Mozilla Thunderbird 52.2.1
    cpe:2.3:a:mozilla:thunderbird:52.2.1
  • Mozilla Thunderbird 52.3.0
    cpe:2.3:a:mozilla:thunderbird:52.3.0
  • Mozilla Thunderbird 52.4.0
    cpe:2.3:a:mozilla:thunderbird:52.4.0
  • Mozilla Thunderbird 52.5.0
    cpe:2.3:a:mozilla:thunderbird:52.5.0
  • Mozilla Thunderbird 52.5.2
    cpe:2.3:a:mozilla:thunderbird:52.5.2
  • Mozilla Thunderbird 52.6.0
    cpe:2.3:a:mozilla:thunderbird:52.6.0
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-787
CAPEC
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3596-2.NASL
    description USN-3596-1 fixed vulnerabilities in Firefox. The update caused an issue where it was not possible to customize the toolbars when running Firefox in Unity. This update fixes the problem. We apologize for the inconvenience. Original advisory details : Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash or opening new tabs, escape the sandbox, bypass same-origin restrictions, obtain sensitive information, confuse the user with misleading permission requests, or execute arbitrary code. (CVE-2018-5125, CVE-2018-5126, CVE-2018-5127, CVE-2018-5128, CVE-2018-5129, CVE-2018-5130, CVE-2018-5136, CVE-2018-5137, CVE-2018-5140, CVE-2018-5141, CVE-2018-5142) It was discovered that the fetch() API could incorrectly return cached copies of no-store/no-cache resources in some circumstances. A local attacker could potentially exploit this to obtain sensitive information in environments where multiple users share a common profile. (CVE-2018-5131) Multiple security issues were discovered with WebExtensions. If a user were tricked in to installing a specially crafted extension, an attacker could potentially exploit these to obtain sensitive information or bypass security restrictions. (CVE-2018-5132, CVE-2018-5134, CVE-2018-5135) It was discovered that the value of app.support.baseURL is not sanitized properly. If a malicious local application were to set this to a specially crafted value, an attacker could potentially exploit this to execute arbitrary code. (CVE-2018-5133) It was discovered that javascript: URLs with embedded tab characters could be pasted in to the addressbar. If a user were tricked in to copying a specially crafted URL in to the addressbar, an attacker could exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2018-5143). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 108949
    published 2018-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108949
    title Ubuntu 14.04 LTS / 16.04 LTS : firefox regression (USN-3596-2)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_C71CDC953C1845B7866AAF28B59AABB5.NASL
    description Mozilla Foundation reports : CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList CVE-2018-5128: Use-after-free manipulating editor selection ranges CVE-2018-5129: Out-of-bounds write with malformed IPC messages CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources CVE-2018-5132: WebExtension Find API can search privileged pages CVE-2018-5133: Value of the app.support.baseURL preference is not properly sanitized CVE-2018-5134: WebExtensions may use view-source: URLs to bypass content restrictions CVE-2018-5135: WebExtension browserAction can inject scripts into unintended contexts CVE-2018-5136: Same-origin policy violation with data: URL shared workers CVE-2018-5137: Script content can access legacy extension non-contentaccessible resources CVE-2018-5138: Android Custom Tab address spoofing through long domain names CVE-2018-5140: Moz-icon images accessible to web content through moz-icon: protocol CVE-2018-5141: DOS attack through notifications Push API CVE-2018-5142: Media Capture and Streams API permissions display incorrect origin with data: and blob: URLs CVE-2018-5143: Self-XSS pasting javascript: URL with embedded tab into addressbar CVE-2018-5126: Memory safety bugs fixed in Firefox 59 CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
    last seen 2019-02-21
    modified 2018-11-23
    plugin id 108315
    published 2018-03-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108315
    title FreeBSD : mozilla -- multiple vulnerabilities (c71cdc95-3c18-45b7-866a-af28b59aabb5)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201811-13.NASL
    description The remote host is affected by the vulnerability described in GLSA-201811-13 (Mozilla Thunderbird: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the referenced Mozilla Foundation Security Advisories and CVE identifiers below for details. Impact : A remote attacker may be able to execute arbitrary code, cause a Denial of Service condition, obtain sensitive information, or conduct Cross-Site Request Forgery (CSRF). Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 119133
    published 2018-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119133
    title GLSA-201811-13 : Mozilla Thunderbird: Multiple vulnerabilities
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3596-1.NASL
    description Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash or opening new tabs, escape the sandbox, bypass same-origin restrictions, obtain sensitive information, confuse the user with misleading permission requests, or execute arbitrary code. (CVE-2018-5125, CVE-2018-5126, CVE-2018-5127, CVE-2018-5128, CVE-2018-5129, CVE-2018-5130, CVE-2018-5136, CVE-2018-5137, CVE-2018-5140, CVE-2018-5141, CVE-2018-5142) It was discovered that the fetch() API could incorrectly return cached copies of no-store/no-cache resources in some circumstances. A local attacker could potentially exploit this to obtain sensitive information in environments where multiple users share a common profile. (CVE-2018-5131) Multiple security issues were discovered with WebExtensions. If a user were tricked in to installing a specially crafted extension, an attacker could potentially exploit these to obtain sensitive information or bypass security restrictions. (CVE-2018-5132, CVE-2018-5134, CVE-2018-5135) It was discovered that the value of app.support.baseURL is not sanitized properly. If a malicious local application were to set this to a specially crafted value, an attacker could potentially exploit this to execute arbitrary code. (CVE-2018-5133) It was discovered that javascript: URLs with embedded tab characters could be pasted in to the addressbar. If a user were tricked in to copying a specially crafted URL in to the addressbar, an attacker could exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2018-5143). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 108370
    published 2018-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108370
    title Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : firefox vulnerabilities (USN-3596-1)
  • NASL family Windows
    NASL id MOZILLA_FIREFOX_59_0.NASL
    description The version of Mozilla Firefox installed on the remote Windows host is prior to 59. It is, therefore, affected by multiple vulnerabilities, some of which allow code execution and potentially exploitable crashes.
    last seen 2019-02-21
    modified 2018-03-22
    plugin id 108377
    published 2018-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108377
    title Mozilla Firefox < 59 Multiple Vulnerabilities
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180315_FIREFOX_ON_SL7_X.NASL
    description This update upgrades Firefox to version 52.7.0 ESR. Security Fix(es) : - Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) - Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) - Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) - Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) - Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) - Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) - Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145)
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 108399
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108399
    title Scientific Linux Security Update : firefox on SL7.x x86_64
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1117.NASL
    description According to the versions of the firefox package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An out of bounds write flaw was found in the processing of vorbis audio data. A maliciously crafted file or audio stream could cause the application to crash or, potentially, execute arbitrary code.(CVE-2018-5146) - Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) - Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) - Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) - Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) - Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) - Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) - Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-19
    plugin id 109515
    published 2018-05-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109515
    title EulerOS 2.0 SP1 : firefox (EulerOS-SA-2018-1117)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-0527.NASL
    description An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.7.0 ESR. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) * Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108384
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108384
    title CentOS 7 : firefox (CESA-2018:0527)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0850-1.NASL
    description This update for MozillaFirefox fixes the following issues: Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130) : - CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 - CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList - CVE-2018-5129: Out-of-bounds write with malformed IPC messages - CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption - CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources - CVE-2018-5144: Integer overflow during Unicode conversion - CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7 - CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671) - CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671) - CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 108749
    published 2018-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108749
    title SUSE SLED12 / SLES12 Security Update : MozillaFirefox (SUSE-SU-2018:0850-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4139.NASL
    description Several security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors and other implementation errors may lead to the execution of arbitrary code, denial of service or information disclosure.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 108387
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108387
    title Debian DSA-4139-1 : firefox-esr - security update
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_FIREFOX_59_0.NASL
    description The version of Mozilla Firefox installed on the remote macOS or Mac OS X host is prior to 59. It is, therefore, affected by multiple vulnerabilities, some of which allow code execution and potentially exploitable crashes.
    last seen 2019-02-21
    modified 2018-03-22
    plugin id 108375
    published 2018-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108375
    title Mozilla Firefox < 59 Multiple Vulnerabilities (macOS)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201810-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-201810-01 (Mozilla Firefox: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the referenced CVE identifiers for details. Impact : A remote attacker could entice a user to view a specially crafted web page, possibly resulting in the execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, spoof the address bar, conduct clickjacking attacks, bypass security restrictions and protection mechanisms, or have other unspecified impact. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 117894
    published 2018-10-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117894
    title GLSA-201810-01 : Mozilla Firefox: Multiple vulnerabilities
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-0648.NASL
    description From Red Hat Security Advisory 2018:0648 : An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.7.0. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Bob Clary, Olli Pettay, Christian Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, Philipp, Jet Villegas, Richard Zhu via Trend Micro's Zero Day Initiative, Nils, James Grant, and Root Object as the original reporters.
    last seen 2019-02-21
    modified 2018-09-05
    plugin id 108862
    published 2018-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108862
    title Oracle Linux 7 : thunderbird (ELSA-2018-0648)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-0648.NASL
    description An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.7.0. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Bob Clary, Olli Pettay, Christian Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, Philipp, Jet Villegas, Richard Zhu via Trend Micro's Zero Day Initiative, Nils, James Grant, and Root Object as the original reporters.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108868
    published 2018-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108868
    title RHEL 7 : thunderbird (RHSA-2018:0648)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-0526.NASL
    description From Red Hat Security Advisory 2018:0526 : An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.7.0 ESR. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) * Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen 2019-02-21
    modified 2018-09-05
    plugin id 108393
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108393
    title Oracle Linux 6 : firefox (ELSA-2018-0526)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-0527.NASL
    description From Red Hat Security Advisory 2018:0527 : An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.7.0 ESR. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) * Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen 2019-02-21
    modified 2018-09-05
    plugin id 108394
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108394
    title Oracle Linux 7 : firefox (ELSA-2018-0527)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-0526.NASL
    description An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.7.0 ESR. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) * Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108383
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108383
    title CentOS 6 : firefox (CESA-2018:0526)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-0647.NASL
    description An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.7.0. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Bob Clary, Olli Pettay, Christian Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, Philipp, Jet Villegas, Richard Zhu via Trend Micro's Zero Day Initiative, Nils, James Grant, and Root Object as the original reporters.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108867
    published 2018-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108867
    title RHEL 6 : thunderbird (RHSA-2018:0647)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1308.NASL
    description Several security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors and other implementation errors may lead to the execution of arbitrary code or denial of service. For Debian 7 'Wheezy', these problems have been fixed in version 52.7.1esr-1~deb7u1. We recommend that you upgrade your firefox-esr packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-08-31
    plugin id 108385
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108385
    title Debian DLA-1308-1 : firefox-esr security update
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-0527.NASL
    description An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.7.0 ESR. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) * Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108397
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108397
    title RHEL 7 : firefox (RHSA-2018:0527)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_FIREFOX_52_7_ESR.NASL
    description The version of Mozilla Firefox ESR installed on the remote macOS or Mac OS X host is prior to 52.7. It is, therefore, affected by multiple vulnerabilities, some of which allow code execution and potentially exploitable crashes.
    last seen 2019-02-21
    modified 2018-03-22
    plugin id 108374
    published 2018-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108374
    title Mozilla Firefox ESR < 52.7 Multiple Vulnerabilities (macOS)
  • NASL family Windows
    NASL id MOZILLA_FIREFOX_52_7_ESR.NASL
    description The version of Mozilla Firefox ESR installed on the remote Windows host is prior to 52.7. It is, therefore, affected by multiple vulnerabilities, some of which allow code execution and potentially exploitable crashes.
    last seen 2019-02-21
    modified 2018-03-30
    plugin id 108376
    published 2018-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108376
    title Mozilla Firefox ESR < 52.7 Multiple Vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-0526.NASL
    description An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.7.0 ESR. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) * Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108396
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108396
    title RHEL 6 : firefox (RHSA-2018:0526)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180405_THUNDERBIRD_ON_SL6_X.NASL
    description This update upgrades Thunderbird to version 52.7.0. Security Fix(es) : - Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) - Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) - Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) - Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) - Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) - Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144)
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 108943
    published 2018-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108943
    title Scientific Linux Security Update : thunderbird on SL6.x i386/x86_64
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1118.NASL
    description According to the versions of the firefox package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An out of bounds write flaw was found in the processing of vorbis audio data. A maliciously crafted file or audio stream could cause the application to crash or, potentially, execute arbitrary code.(CVE-2018-5146) - Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) - Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) - Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) - Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) - Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) - Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) - Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) - Use-after-free in compositor potentially allows code execution (CVE-2018-5148) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-19
    plugin id 109516
    published 2018-05-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109516
    title EulerOS 2.0 SP2 : firefox (EulerOS-SA-2018-1118)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4155.NASL
    description Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code, denial of service or information disclosure.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 108697
    published 2018-03-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108697
    title Debian DSA-4155-1 : thunderbird - security update
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180405_THUNDERBIRD_ON_SL7_X.NASL
    description This update upgrades Thunderbird to version 52.7.0. Security Fix(es) : - Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) - Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) - Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) - Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) - Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) - Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144)
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 108944
    published 2018-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108944
    title Scientific Linux Security Update : thunderbird on SL7.x x86_64
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3545-1.NASL
    description Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, or execute arbitrary code. (CVE-2018-5125, CVE-2018-5127, CVE-2018-5129, CVE-2018-5144, CVE-2018-5145, CVE-2018-5146). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 108751
    published 2018-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108751
    title Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : thunderbird vulnerabilities (USN-3545-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1327.NASL
    description Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code, denial of service or information disclosure. For Debian 7 'Wheezy', these problems have been fixed in version 1:52.7.0-1~deb7u1. We recommend that you upgrade your thunderbird packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-08-31
    plugin id 108727
    published 2018-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108727
    title Debian DLA-1327-1 : thunderbird security update
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-0647.NASL
    description An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.7.0. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Bob Clary, Olli Pettay, Christian Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, Philipp, Jet Villegas, Richard Zhu via Trend Micro's Zero Day Initiative, Nils, James Grant, and Root Object as the original reporters.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108898
    published 2018-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108898
    title CentOS 6 : thunderbird (CESA-2018:0647)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-313.NASL
    description This update for Mozilla Thunderbird to version 52.7 fixes multiple issues. The following bugs were fixed : - Searching message bodies of messages in local folders, including filter and quick filter operations, did not find content in message attachments - Better error handling for Yahoo accounts The following security fixes are included as part of the mozilla platform. In general, these flaws cannot be exploited through email in Thunderbird because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts (MFSA 2018-09, bsc#1085130, bsc#1085671) : - CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList - CVE-2018-5129: Out-of-bounds write with malformed IPC messages - CVE-2018-5144: Integer overflow during Unicode conversion - CVE-2018-5146: Out of bounds memory write in libvorbis - CVE-2018-5125: Memory safety bugs fixed in Thunderbird 52.7 - CVE-2018-5145: Memory safety bugs fixed in Thunderbird 52.7
    last seen 2019-02-21
    modified 2018-09-04
    plugin id 108636
    published 2018-03-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108636
    title openSUSE Security Update : Mozilla Thunderbird (openSUSE-2018-313)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-0647.NASL
    description From Red Hat Security Advisory 2018:0647 : An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.7.0. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Bob Clary, Olli Pettay, Christian Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, Philipp, Jet Villegas, Richard Zhu via Trend Micro's Zero Day Initiative, Nils, James Grant, and Root Object as the original reporters.
    last seen 2019-02-21
    modified 2018-09-05
    plugin id 108938
    published 2018-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108938
    title Oracle Linux 6 : thunderbird (ELSA-2018-0647)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-255.NASL
    description This update for Mozilla Firefox to version 52.7.0esr fixes multiple issues. Security issues fixed (bsc#1085130, MFSA 2018-07) : - CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList - CVE-2018-5129: Out-of-bounds write with malformed IPC messages - CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption - CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources - CVE-2018-5144: Integer overflow during Unicode conversion - CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 - CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7 The following bug fixes are included : - bsc#1076907: provide mimehandler(text/html)
    last seen 2019-02-21
    modified 2018-09-04
    plugin id 108356
    published 2018-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108356
    title openSUSE Security Update : MozillaFirefox (openSUSE-2018-255)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180315_FIREFOX_ON_SL6_X.NASL
    description This update upgrades Firefox to version 52.7.0 ESR. Security Fix(es) : - Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) - Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) - Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) - Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) - Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) - Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) - Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145)
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 108398
    published 2018-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108398
    title Scientific Linux Security Update : firefox on SL6.x i386/x86_64
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-0648.NASL
    description An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.7.0. Security Fix(es) : * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Bob Clary, Olli Pettay, Christian Holler, Nils Ohlmeier, Randell Jesup, Tyson Smith, Ralph Giles, Philipp, Jet Villegas, Richard Zhu via Trend Micro's Zero Day Initiative, Nils, James Grant, and Root Object as the original reporters.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108899
    published 2018-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108899
    title CentOS 7 : thunderbird (CESA-2018:0648)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0907-1.NASL
    description This update for MozillaFirefox fixes the following issues: Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130) : - CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 - CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList - CVE-2018-5129: Out-of-bounds write with malformed IPC messages - CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption - CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources - CVE-2018-5144: Integer overflow during Unicode conversion - CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7 - CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671) - CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671) - CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 109000
    published 2018-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109000
    title SUSE SLES11 Security Update : MozillaFirefox (SUSE-SU-2018:0907-1)
redhat via4
advisories
  • rhsa
    id RHSA-2018:0526
  • rhsa
    id RHSA-2018:0527
  • rhsa
    id RHSA-2018:0647
  • rhsa
    id RHSA-2018:0648
rpms
  • firefox-0:52.7.0-1.el6_9
  • firefox-0:52.7.0-1.el7_4
  • thunderbird-0:52.7.0-1.el6_9
  • thunderbird-0:52.7.0-1.el7_4
refmap via4
bid 103388
confirm
debian
  • DSA-4139
  • DSA-4155
gentoo
  • GLSA-201810-01
  • GLSA-201811-13
mlist
  • [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
  • [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
sectrack 1040514
ubuntu
  • USN-3545-1
  • USN-3596-1
Last major update 11-06-2018 - 17:29
Published 11-06-2018 - 17:29
Last modified 08-03-2019 - 09:22
Back to Top