ID CVE-2018-18505
Summary An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
References
Vulnerable Configurations
  • Mozilla Firefox
    cpe:2.3:a:mozilla:firefox
  • Mozilla Firefox 0.1
    cpe:2.3:a:mozilla:firefox:0.1
  • Mozilla Firefox 0.2
    cpe:2.3:a:mozilla:firefox:0.2
  • Mozilla Firefox 0.3
    cpe:2.3:a:mozilla:firefox:0.3
  • Mozilla Firefox 0.4
    cpe:2.3:a:mozilla:firefox:0.4
  • Mozilla Firefox 0.5
    cpe:2.3:a:mozilla:firefox:0.5
  • Mozilla Firefox 0.6
    cpe:2.3:a:mozilla:firefox:0.6
  • Mozilla Firefox 0.6.1
    cpe:2.3:a:mozilla:firefox:0.6.1
  • Mozilla Firefox 0.7
    cpe:2.3:a:mozilla:firefox:0.7
  • Mozilla Firefox 0.7.1
    cpe:2.3:a:mozilla:firefox:0.7.1
  • Mozilla Firefox 0.8
    cpe:2.3:a:mozilla:firefox:0.8
  • Mozilla Firefox 0.9
    cpe:2.3:a:mozilla:firefox:0.9
  • Mozilla Firefox 0.9 rc
    cpe:2.3:a:mozilla:firefox:0.9:rc
  • Mozilla Firefox 0.9.1
    cpe:2.3:a:mozilla:firefox:0.9.1
  • Mozilla Firefox 0.9.2
    cpe:2.3:a:mozilla:firefox:0.9.2
  • Mozilla Firefox 0.9.3
    cpe:2.3:a:mozilla:firefox:0.9.3
  • Mozilla Firefox 0.10
    cpe:2.3:a:mozilla:firefox:0.10
  • Mozilla Firefox 0.10.1
    cpe:2.3:a:mozilla:firefox:0.10.1
  • Mozilla Firefox 1.0
    cpe:2.3:a:mozilla:firefox:1.0
  • Mozilla Firefox 1.0 Preview Release
    cpe:2.3:a:mozilla:firefox:1.0:preview_release
  • Mozilla Firefox 1.0.1
    cpe:2.3:a:mozilla:firefox:1.0.1
  • Mozilla Firefox 1.0.2
    cpe:2.3:a:mozilla:firefox:1.0.2
  • Mozilla Firefox 1.0.3
    cpe:2.3:a:mozilla:firefox:1.0.3
  • Mozilla Firefox 1.0.4
    cpe:2.3:a:mozilla:firefox:1.0.4
  • Mozilla Firefox 1.0.5
    cpe:2.3:a:mozilla:firefox:1.0.5
  • Mozilla Firefox 1.0.6
    cpe:2.3:a:mozilla:firefox:1.0.6
  • Mozilla Firefox 1.0.7
    cpe:2.3:a:mozilla:firefox:1.0.7
  • Mozilla Firefox 1.0.8
    cpe:2.3:a:mozilla:firefox:1.0.8
  • Mozilla Firefox 1.4.1
    cpe:2.3:a:mozilla:firefox:1.4.1
  • Mozilla Firefox 1.5
    cpe:2.3:a:mozilla:firefox:1.5
  • Mozilla Firefox 1.5 Beta 1
    cpe:2.3:a:mozilla:firefox:1.5:beta1
  • Mozilla Firefox 1.5 Beta 2
    cpe:2.3:a:mozilla:firefox:1.5:beta2
  • Mozilla Firefox 1.5.0.1
    cpe:2.3:a:mozilla:firefox:1.5.0.1
  • Mozilla Firefox 1.5.0.2
    cpe:2.3:a:mozilla:firefox:1.5.0.2
  • Mozilla Firefox 1.5.0.3
    cpe:2.3:a:mozilla:firefox:1.5.0.3
  • Mozilla Firefox 1.5.0.4
    cpe:2.3:a:mozilla:firefox:1.5.0.4
  • Mozilla Firefox 1.5.0.5
    cpe:2.3:a:mozilla:firefox:1.5.0.5
  • Mozilla Firefox 1.5.0.6
    cpe:2.3:a:mozilla:firefox:1.5.0.6
  • Mozilla Firefox 1.5.0.7
    cpe:2.3:a:mozilla:firefox:1.5.0.7
  • Mozilla Firefox 1.5.0.8
    cpe:2.3:a:mozilla:firefox:1.5.0.8
  • Mozilla Firefox 1.5.0.9
    cpe:2.3:a:mozilla:firefox:1.5.0.9
  • Mozilla Firefox 1.5.0.10
    cpe:2.3:a:mozilla:firefox:1.5.0.10
  • Mozilla Firefox 1.5.0.11
    cpe:2.3:a:mozilla:firefox:1.5.0.11
  • Mozilla Firefox 1.5.0.12
    cpe:2.3:a:mozilla:firefox:1.5.0.12
  • Mozilla Firefox 1.5.1
    cpe:2.3:a:mozilla:firefox:1.5.1
  • Mozilla Firefox 1.5.2
    cpe:2.3:a:mozilla:firefox:1.5.2
  • Mozilla Firefox 1.5.3
    cpe:2.3:a:mozilla:firefox:1.5.3
  • Mozilla Firefox 1.5.4
    cpe:2.3:a:mozilla:firefox:1.5.4
  • Mozilla Firefox 1.5.5
    cpe:2.3:a:mozilla:firefox:1.5.5
  • Mozilla Firefox 1.5.6
    cpe:2.3:a:mozilla:firefox:1.5.6
  • Mozilla Firefox 1.5.7
    cpe:2.3:a:mozilla:firefox:1.5.7
  • Mozilla Firefox 1.5.8
    cpe:2.3:a:mozilla:firefox:1.5.8
  • Mozilla Firefox 1.8
    cpe:2.3:a:mozilla:firefox:1.8
  • Mozilla Firefox 2.0
    cpe:2.3:a:mozilla:firefox:2.0
  • Mozilla Firefox 2.0.0.1
    cpe:2.3:a:mozilla:firefox:2.0.0.1
  • Mozilla Firefox 2.0.0.2
    cpe:2.3:a:mozilla:firefox:2.0.0.2
  • Mozilla Firefox 2.0.0.3
    cpe:2.3:a:mozilla:firefox:2.0.0.3
  • Mozilla Firefox 2.0.0.4
    cpe:2.3:a:mozilla:firefox:2.0.0.4
  • Mozilla Firefox 2.0.0.5
    cpe:2.3:a:mozilla:firefox:2.0.0.5
  • Mozilla Firefox 2.0.0.6
    cpe:2.3:a:mozilla:firefox:2.0.0.6
  • Mozilla Firefox 2.0.0.7
    cpe:2.3:a:mozilla:firefox:2.0.0.7
  • Mozilla Firefox 2.0.0.8
    cpe:2.3:a:mozilla:firefox:2.0.0.8
  • Mozilla Firefox 2.0.0.9
    cpe:2.3:a:mozilla:firefox:2.0.0.9
  • Mozilla Firefox 2.0.0.10
    cpe:2.3:a:mozilla:firefox:2.0.0.10
  • Mozilla Firefox 2.0.0.11
    cpe:2.3:a:mozilla:firefox:2.0.0.11
  • Mozilla Firefox 2.0.0.12
    cpe:2.3:a:mozilla:firefox:2.0.0.12
  • Mozilla Firefox 2.0.0.13
    cpe:2.3:a:mozilla:firefox:2.0.0.13
  • Mozilla Firefox 2.0.0.14
    cpe:2.3:a:mozilla:firefox:2.0.0.14
  • Mozilla Firefox 2.0.0.15
    cpe:2.3:a:mozilla:firefox:2.0.0.15
  • Mozilla Firefox 2.0.0.16
    cpe:2.3:a:mozilla:firefox:2.0.0.16
  • Mozilla Firefox 2.0.0.17
    cpe:2.3:a:mozilla:firefox:2.0.0.17
  • Mozilla Firefox 2.0.0.18
    cpe:2.3:a:mozilla:firefox:2.0.0.18
  • Mozilla Firefox 2.0.0.19
    cpe:2.3:a:mozilla:firefox:2.0.0.19
  • Mozilla Firefox 2.0.0.20
    cpe:2.3:a:mozilla:firefox:2.0.0.20
  • Mozilla Firefox 3.0
    cpe:2.3:a:mozilla:firefox:3.0
  • Mozilla Firefox 3.0.1
    cpe:2.3:a:mozilla:firefox:3.0.1
  • Mozilla Firefox 3.0.2
    cpe:2.3:a:mozilla:firefox:3.0.2
  • Mozilla Firefox 3.0.3
    cpe:2.3:a:mozilla:firefox:3.0.3
  • Mozilla Firefox 3.0.4
    cpe:2.3:a:mozilla:firefox:3.0.4
  • Mozilla Firefox 3.0.5
    cpe:2.3:a:mozilla:firefox:3.0.5
  • Mozilla Firefox 3.0.6
    cpe:2.3:a:mozilla:firefox:3.0.6
  • Mozilla Firefox 3.0.7
    cpe:2.3:a:mozilla:firefox:3.0.7
  • Mozilla Firefox 3.0.8
    cpe:2.3:a:mozilla:firefox:3.0.8
  • Mozilla Firefox 3.0.9
    cpe:2.3:a:mozilla:firefox:3.0.9
  • Mozilla Firefox 3.0.10
    cpe:2.3:a:mozilla:firefox:3.0.10
  • Mozilla Firefox 3.0.11
    cpe:2.3:a:mozilla:firefox:3.0.11
  • Mozilla Firefox 3.0.12
    cpe:2.3:a:mozilla:firefox:3.0.12
  • Mozilla Firefox 3.0.13
    cpe:2.3:a:mozilla:firefox:3.0.13
  • Mozilla Firefox 3.0.14
    cpe:2.3:a:mozilla:firefox:3.0.14
  • Mozilla Firefox 3.0.15
    cpe:2.3:a:mozilla:firefox:3.0.15
  • Mozilla Firefox 3.0.16
    cpe:2.3:a:mozilla:firefox:3.0.16
  • Mozilla Firefox 3.0.17
    cpe:2.3:a:mozilla:firefox:3.0.17
  • Mozilla Firefox 3.0.18
    cpe:2.3:a:mozilla:firefox:3.0.18
  • Mozilla Firefox 3.0.19
    cpe:2.3:a:mozilla:firefox:3.0.19
  • Mozilla Firefox 3.5
    cpe:2.3:a:mozilla:firefox:3.5
  • Mozilla Firefox 3.5.1
    cpe:2.3:a:mozilla:firefox:3.5.1
  • Mozilla Firefox 3.5.2
    cpe:2.3:a:mozilla:firefox:3.5.2
  • Mozilla Firefox 3.5.3
    cpe:2.3:a:mozilla:firefox:3.5.3
  • Mozilla Firefox 3.5.4
    cpe:2.3:a:mozilla:firefox:3.5.4
  • Mozilla Firefox 3.5.5
    cpe:2.3:a:mozilla:firefox:3.5.5
  • Mozilla Firefox 3.5.6
    cpe:2.3:a:mozilla:firefox:3.5.6
  • Mozilla Firefox 3.5.7
    cpe:2.3:a:mozilla:firefox:3.5.7
  • Mozilla Firefox 3.5.8
    cpe:2.3:a:mozilla:firefox:3.5.8
  • Mozilla Firefox 3.5.9
    cpe:2.3:a:mozilla:firefox:3.5.9
  • Mozilla Firefox 3.5.10
    cpe:2.3:a:mozilla:firefox:3.5.10
  • Mozilla Firefox 3.5.11
    cpe:2.3:a:mozilla:firefox:3.5.11
  • Mozilla Firefox 3.5.12
    cpe:2.3:a:mozilla:firefox:3.5.12
  • Mozilla Firefox 3.5.13
    cpe:2.3:a:mozilla:firefox:3.5.13
  • Mozilla Firefox 3.5.14
    cpe:2.3:a:mozilla:firefox:3.5.14
  • Mozilla Firefox 3.5.15
    cpe:2.3:a:mozilla:firefox:3.5.15
  • Mozilla Firefox 3.5.16
    cpe:2.3:a:mozilla:firefox:3.5.16
  • Mozilla Firefox 3.5.17
    cpe:2.3:a:mozilla:firefox:3.5.17
  • Mozilla Firefox 3.5.18
    cpe:2.3:a:mozilla:firefox:3.5.18
  • Mozilla Firefox 3.5.19
    cpe:2.3:a:mozilla:firefox:3.5.19
  • Mozilla Firefox 3.6
    cpe:2.3:a:mozilla:firefox:3.6
  • Mozilla Firefox 3.6.2
    cpe:2.3:a:mozilla:firefox:3.6.2
  • Mozilla Firefox 3.6.3
    cpe:2.3:a:mozilla:firefox:3.6.3
  • Mozilla Firefox 3.6.4
    cpe:2.3:a:mozilla:firefox:3.6.4
  • Mozilla Firefox 3.6.6
    cpe:2.3:a:mozilla:firefox:3.6.6
  • Mozilla Firefox 3.6.7
    cpe:2.3:a:mozilla:firefox:3.6.7
  • Mozilla Firefox 3.6.8
    cpe:2.3:a:mozilla:firefox:3.6.8
  • Mozilla Firefox 3.6.9
    cpe:2.3:a:mozilla:firefox:3.6.9
  • Mozilla Firefox 3.6.10
    cpe:2.3:a:mozilla:firefox:3.6.10
  • Mozilla Firefox 3.6.11
    cpe:2.3:a:mozilla:firefox:3.6.11
  • Mozilla Firefox 3.6.12
    cpe:2.3:a:mozilla:firefox:3.6.12
  • Mozilla Firefox 3.6.13
    cpe:2.3:a:mozilla:firefox:3.6.13
  • Mozilla Firefox 3.6.14
    cpe:2.3:a:mozilla:firefox:3.6.14
  • Mozilla Firefox 3.6.15
    cpe:2.3:a:mozilla:firefox:3.6.15
  • Mozilla Firefox 3.6.16
    cpe:2.3:a:mozilla:firefox:3.6.16
  • Mozilla Firefox 3.6.17
    cpe:2.3:a:mozilla:firefox:3.6.17
  • Mozilla Firefox 3.6.18
    cpe:2.3:a:mozilla:firefox:3.6.18
  • Mozilla Firefox 3.6.19
    cpe:2.3:a:mozilla:firefox:3.6.19
  • Mozilla Firefox 3.6.20
    cpe:2.3:a:mozilla:firefox:3.6.20
  • Mozilla Firefox 3.6.21
    cpe:2.3:a:mozilla:firefox:3.6.21
  • Mozilla Firefox 3.6.22
    cpe:2.3:a:mozilla:firefox:3.6.22
  • Mozilla Firefox 3.6.23
    cpe:2.3:a:mozilla:firefox:3.6.23
  • Mozilla Firefox 3.6.24
    cpe:2.3:a:mozilla:firefox:3.6.24
  • Mozilla Firefox 3.6.25
    cpe:2.3:a:mozilla:firefox:3.6.25
  • Mozilla Firefox 3.6.26
    cpe:2.3:a:mozilla:firefox:3.6.26
  • Mozilla Firefox 3.6.27
    cpe:2.3:a:mozilla:firefox:3.6.27
  • Mozilla Firefox 3.6.28
    cpe:2.3:a:mozilla:firefox:3.6.28
  • Mozilla Firefox 4.0
    cpe:2.3:a:mozilla:firefox:4.0
  • Mozilla Firefox 4.0 beta1
    cpe:2.3:a:mozilla:firefox:4.0:beta1
  • Mozilla Firefox 4.0 beta10
    cpe:2.3:a:mozilla:firefox:4.0:beta10
  • Mozilla Firefox 4.0 beta11
    cpe:2.3:a:mozilla:firefox:4.0:beta11
  • Mozilla Firefox 4.0 beta12
    cpe:2.3:a:mozilla:firefox:4.0:beta12
  • Mozilla Firefox 4.0 beta2
    cpe:2.3:a:mozilla:firefox:4.0:beta2
  • Mozilla Firefox 4.0 beta3
    cpe:2.3:a:mozilla:firefox:4.0:beta3
  • Mozilla Firefox 4.0 beta4
    cpe:2.3:a:mozilla:firefox:4.0:beta4
  • Mozilla Firefox 4.0 beta5
    cpe:2.3:a:mozilla:firefox:4.0:beta5
  • Mozilla Firefox 4.0 beta6
    cpe:2.3:a:mozilla:firefox:4.0:beta6
  • Mozilla Firefox 4.0 beta7
    cpe:2.3:a:mozilla:firefox:4.0:beta7
  • Mozilla Firefox 4.0 beta8
    cpe:2.3:a:mozilla:firefox:4.0:beta8
  • Mozilla Firefox 4.0 beta9
    cpe:2.3:a:mozilla:firefox:4.0:beta9
  • Mozilla Firefox 4.0.1
    cpe:2.3:a:mozilla:firefox:4.0.1
  • Mozilla Firefox 5.0
    cpe:2.3:a:mozilla:firefox:5.0
  • Mozilla Firefox 5.0.1
    cpe:2.3:a:mozilla:firefox:5.0.1
  • Mozilla Firefox 6.0
    cpe:2.3:a:mozilla:firefox:6.0
  • Mozilla Firefox 6.0.1
    cpe:2.3:a:mozilla:firefox:6.0.1
  • Mozilla Firefox 6.0.2
    cpe:2.3:a:mozilla:firefox:6.0.2
  • Mozilla Firefox 7.0
    cpe:2.3:a:mozilla:firefox:7.0
  • Mozilla Firefox 7.0.1
    cpe:2.3:a:mozilla:firefox:7.0.1
  • Mozilla Firefox 8.0
    cpe:2.3:a:mozilla:firefox:8.0
  • Mozilla Firefox 8.0.1
    cpe:2.3:a:mozilla:firefox:8.0.1
  • Mozilla Firefox 9.0
    cpe:2.3:a:mozilla:firefox:9.0
  • Mozilla Firefox 9.0.1
    cpe:2.3:a:mozilla:firefox:9.0.1
  • Mozilla Firefox 10.0
    cpe:2.3:a:mozilla:firefox:10.0
  • Mozilla Firefox 10.0.1
    cpe:2.3:a:mozilla:firefox:10.0.1
  • Mozilla Firefox 10.0.2
    cpe:2.3:a:mozilla:firefox:10.0.2
  • Mozilla Firefox 10.0.3
    cpe:2.3:a:mozilla:firefox:10.0.3
  • Mozilla Firefox 10.0.4
    cpe:2.3:a:mozilla:firefox:10.0.4
  • Mozilla Firefox 10.0.5
    cpe:2.3:a:mozilla:firefox:10.0.5
  • Mozilla Firefox 10.0.6
    cpe:2.3:a:mozilla:firefox:10.0.6
  • Mozilla Firefox 10.0.7
    cpe:2.3:a:mozilla:firefox:10.0.7
  • Mozilla Firefox 10.0.8
    cpe:2.3:a:mozilla:firefox:10.0.8
  • Mozilla Firefox 10.0.9
    cpe:2.3:a:mozilla:firefox:10.0.9
  • Mozilla Firefox 10.0.10
    cpe:2.3:a:mozilla:firefox:10.0.10
  • Mozilla Firefox 10.0.11
    cpe:2.3:a:mozilla:firefox:10.0.11
  • Mozilla Firefox 10.0.12
    cpe:2.3:a:mozilla:firefox:10.0.12
  • Mozilla Firefox 11.0
    cpe:2.3:a:mozilla:firefox:11.0
  • Mozilla Firefox 12.0
    cpe:2.3:a:mozilla:firefox:12.0
  • Mozilla Firefox 12.0 beta6
    cpe:2.3:a:mozilla:firefox:12.0:beta6
  • Mozilla Firefox 13.0
    cpe:2.3:a:mozilla:firefox:13.0
  • Mozilla Firefox 13.0.1
    cpe:2.3:a:mozilla:firefox:13.0.1
  • Mozilla Firefox 14.0
    cpe:2.3:a:mozilla:firefox:14.0
  • Mozilla Firefox 14.0.1
    cpe:2.3:a:mozilla:firefox:14.0.1
  • Mozilla Firefox 15.0
    cpe:2.3:a:mozilla:firefox:15.0
  • Mozilla Firefox 15.0.1
    cpe:2.3:a:mozilla:firefox:15.0.1
  • Mozilla Firefox 16.0
    cpe:2.3:a:mozilla:firefox:16.0
  • Mozilla Firefox 16.0.1
    cpe:2.3:a:mozilla:firefox:16.0.1
  • Mozilla Firefox 16.0.2
    cpe:2.3:a:mozilla:firefox:16.0.2
  • Mozilla Firefox 17.0
    cpe:2.3:a:mozilla:firefox:17.0
  • Mozilla Firefox 17.0.1
    cpe:2.3:a:mozilla:firefox:17.0.1
  • Mozilla Firefox 17.0.2
    cpe:2.3:a:mozilla:firefox:17.0.2
  • Mozilla Firefox 17.0.3
    cpe:2.3:a:mozilla:firefox:17.0.3
  • Mozilla Firefox 17.0.4
    cpe:2.3:a:mozilla:firefox:17.0.4
  • Mozilla Firefox 17.0.5
    cpe:2.3:a:mozilla:firefox:17.0.5
  • Mozilla Firefox 17.0.6
    cpe:2.3:a:mozilla:firefox:17.0.6
  • Mozilla Firefox 17.0.7
    cpe:2.3:a:mozilla:firefox:17.0.7
  • Mozilla Firefox 17.0.8
    cpe:2.3:a:mozilla:firefox:17.0.8
  • Mozilla Firefox 17.0.9
    cpe:2.3:a:mozilla:firefox:17.0.9
  • Mozilla Firefox 17.0.10
    cpe:2.3:a:mozilla:firefox:17.0.10
  • Mozilla Firefox 17.0.11
    cpe:2.3:a:mozilla:firefox:17.0.11
  • Mozilla Firefox 18.0
    cpe:2.3:a:mozilla:firefox:18.0
  • Mozilla Firefox 18.0.1
    cpe:2.3:a:mozilla:firefox:18.0.1
  • Mozilla Firefox 18.0.2
    cpe:2.3:a:mozilla:firefox:18.0.2
  • Mozilla Firefox 19.0
    cpe:2.3:a:mozilla:firefox:19.0
  • Mozilla Firefox 19.0.1
    cpe:2.3:a:mozilla:firefox:19.0.1
  • Mozilla Firefox 19.0.2
    cpe:2.3:a:mozilla:firefox:19.0.2
  • Mozilla Firefox 20.0
    cpe:2.3:a:mozilla:firefox:20.0
  • Mozilla Firefox 20.0.1
    cpe:2.3:a:mozilla:firefox:20.0.1
  • Mozilla Firefox 21.0
    cpe:2.3:a:mozilla:firefox:21.0
  • Mozilla Firefox 22.0
    cpe:2.3:a:mozilla:firefox:22.0
  • Mozilla Firefox 23.0
    cpe:2.3:a:mozilla:firefox:23.0
  • Mozilla Firefox 23.0.1
    cpe:2.3:a:mozilla:firefox:23.0.1
  • Mozilla Firefox 24.0
    cpe:2.3:a:mozilla:firefox:24.0
  • Mozilla Firefox 24.1
    cpe:2.3:a:mozilla:firefox:24.1
  • Mozilla Firefox 24.1.0
    cpe:2.3:a:mozilla:firefox:24.1.0
  • Mozilla Firefox 24.1.1
    cpe:2.3:a:mozilla:firefox:24.1.1
  • Mozilla Firefox 24.2.0
    cpe:2.3:a:mozilla:firefox:24.2.0
  • Mozilla Firefox 24.3.0
    cpe:2.3:a:mozilla:firefox:24.3.0
  • Mozilla Firefox 24.4.0
    cpe:2.3:a:mozilla:firefox:24.4.0
  • Mozilla Firefox 24.5.0
    cpe:2.3:a:mozilla:firefox:24.5.0
  • Mozilla Firefox 24.6.0
    cpe:2.3:a:mozilla:firefox:24.6.0
  • Mozilla Firefox 24.7.0
    cpe:2.3:a:mozilla:firefox:24.7.0
  • Mozilla Firefox 24.8.0
    cpe:2.3:a:mozilla:firefox:24.8.0
  • Mozilla Firefox 24.8.1
    cpe:2.3:a:mozilla:firefox:24.8.1
  • Mozilla Firefox 25.0
    cpe:2.3:a:mozilla:firefox:25.0
  • Mozilla Firefox 25.0.1
    cpe:2.3:a:mozilla:firefox:25.0.1
  • Mozilla Firefox 26.0
    cpe:2.3:a:mozilla:firefox:26.0
  • Mozilla Firefox 27.0
    cpe:2.3:a:mozilla:firefox:27.0
  • Mozilla Firefox 27.0.1
    cpe:2.3:a:mozilla:firefox:27.0.1
  • Mozilla Firefox 28.0
    cpe:2.3:a:mozilla:firefox:28.0
  • Mozilla Firefox 29.0
    cpe:2.3:a:mozilla:firefox:29.0
  • Mozilla Firefox 29.0.1
    cpe:2.3:a:mozilla:firefox:29.0.1
  • Mozilla Firefox 30.0
    cpe:2.3:a:mozilla:firefox:30.0
  • Mozilla Firefox 31.0
    cpe:2.3:a:mozilla:firefox:31.0
  • Mozilla Firefox 31.1.0
    cpe:2.3:a:mozilla:firefox:31.1.0
  • Mozilla Firefox 31.1.1
    cpe:2.3:a:mozilla:firefox:31.1.1
  • Mozilla Firefox 31.2.0
    cpe:2.3:a:mozilla:firefox:31.2.0
  • Mozilla Firefox 31.3.0
    cpe:2.3:a:mozilla:firefox:31.3.0
  • Mozilla Firefox 31.4.0
    cpe:2.3:a:mozilla:firefox:31.4.0
  • Mozilla Firefox 31.5.0
    cpe:2.3:a:mozilla:firefox:31.5.0
  • Mozilla Firefox 31.5.2
    cpe:2.3:a:mozilla:firefox:31.5.2
  • Mozilla Firefox 31.5.3
    cpe:2.3:a:mozilla:firefox:31.5.3
  • Mozilla Firefox 31.6.0
    cpe:2.3:a:mozilla:firefox:31.6.0
  • Mozilla Firefox 31.7.0
    cpe:2.3:a:mozilla:firefox:31.7.0
  • Mozilla Firefox 31.8.0
    cpe:2.3:a:mozilla:firefox:31.8.0
  • Mozilla Firefox 32.0
    cpe:2.3:a:mozilla:firefox:32.0
  • Mozilla Firefox 32.0.1
    cpe:2.3:a:mozilla:firefox:32.0.1
  • Mozilla Firefox 32.0.2
    cpe:2.3:a:mozilla:firefox:32.0.2
  • Mozilla Firefox 32.0.3
    cpe:2.3:a:mozilla:firefox:32.0.3
  • Mozilla Firefox 33.0
    cpe:2.3:a:mozilla:firefox:33.0
  • Mozilla Firefox 33.0.1
    cpe:2.3:a:mozilla:firefox:33.0.1
  • Mozilla Firefox 33.0.2
    cpe:2.3:a:mozilla:firefox:33.0.2
  • Mozilla Firefox 33.0.3
    cpe:2.3:a:mozilla:firefox:33.0.3
  • Mozilla Firefox 33.1
    cpe:2.3:a:mozilla:firefox:33.1
  • Mozilla Firefox 33.1.1
    cpe:2.3:a:mozilla:firefox:33.1.1
  • Mozilla Firefox 34.0
    cpe:2.3:a:mozilla:firefox:34.0
  • Mozilla Firefox 34.0.5
    cpe:2.3:a:mozilla:firefox:34.0.5
  • Mozilla Firefox 35.0
    cpe:2.3:a:mozilla:firefox:35.0
  • Mozilla Firefox 35.0.1
    cpe:2.3:a:mozilla:firefox:35.0.1
  • Mozilla Firefox 36.0
    cpe:2.3:a:mozilla:firefox:36.0
  • Mozilla Firefox 36.0.1
    cpe:2.3:a:mozilla:firefox:36.0.1
  • Mozilla Firefox 36.0.3
    cpe:2.3:a:mozilla:firefox:36.0.3
  • Mozilla Firefox 36.0.4
    cpe:2.3:a:mozilla:firefox:36.0.4
  • Mozilla Firefox 37.0
    cpe:2.3:a:mozilla:firefox:37.0
  • Mozilla Firefox 37.0.1
    cpe:2.3:a:mozilla:firefox:37.0.1
  • Mozilla Firefox 37.0.2
    cpe:2.3:a:mozilla:firefox:37.0.2
  • Mozilla Firefox 38.0
    cpe:2.3:a:mozilla:firefox:38.0
  • Mozilla Firefox 38.0.1
    cpe:2.3:a:mozilla:firefox:38.0.1
  • Mozilla Firefox 38.0.5
    cpe:2.3:a:mozilla:firefox:38.0.5
  • Mozilla Firefox 38.1.0
    cpe:2.3:a:mozilla:firefox:38.1.0
  • Mozilla Firefox 38.1.1
    cpe:2.3:a:mozilla:firefox:38.1.1
  • Mozilla Firefox 38.2.0
    cpe:2.3:a:mozilla:firefox:38.2.0
  • Mozilla Firefox 38.2.1
    cpe:2.3:a:mozilla:firefox:38.2.1
  • Mozilla Firefox 38.3.0
    cpe:2.3:a:mozilla:firefox:38.3.0
  • Mozilla Firefox 38.4.0
    cpe:2.3:a:mozilla:firefox:38.4.0
  • Mozilla Firefox 38.5.0
    cpe:2.3:a:mozilla:firefox:38.5.0
  • Mozilla Firefox 38.5.1
    cpe:2.3:a:mozilla:firefox:38.5.1
  • Mozilla Firefox 38.5.2
    cpe:2.3:a:mozilla:firefox:38.5.2
  • Mozilla Firefox 38.6.0
    cpe:2.3:a:mozilla:firefox:38.6.0
  • Mozilla Firefox 38.6.1
    cpe:2.3:a:mozilla:firefox:38.6.1
  • Mozilla Firefox 38.7.0
    cpe:2.3:a:mozilla:firefox:38.7.0
  • Mozilla Firefox 38.7.1
    cpe:2.3:a:mozilla:firefox:38.7.1
  • Mozilla Firefox 38.8.0
    cpe:2.3:a:mozilla:firefox:38.8.0
  • Mozilla Firefox 39.0
    cpe:2.3:a:mozilla:firefox:39.0
  • Mozilla Firefox 39.0.3
    cpe:2.3:a:mozilla:firefox:39.0.3
  • Mozilla Firefox 40.0
    cpe:2.3:a:mozilla:firefox:40.0
  • Mozilla Firefox 40.0.2
    cpe:2.3:a:mozilla:firefox:40.0.2
  • Mozilla Firefox 40.0.3
    cpe:2.3:a:mozilla:firefox:40.0.3
  • Mozilla Firefox 41.0
    cpe:2.3:a:mozilla:firefox:41.0
  • Mozilla Firefox 41.0.1
    cpe:2.3:a:mozilla:firefox:41.0.1
  • Mozilla Firefox 41.0.2
    cpe:2.3:a:mozilla:firefox:41.0.2
  • Mozilla Firefox 42.0
    cpe:2.3:a:mozilla:firefox:42.0
  • Mozilla Firefox 42.0 (64 bit)
    cpe:2.3:a:mozilla:firefox:42.0:-:-:-:-:-:x64
  • Mozilla Firefox 43.0
    cpe:2.3:a:mozilla:firefox:43.0
  • Mozilla Firefox 43.0.1
    cpe:2.3:a:mozilla:firefox:43.0.1
  • Mozilla Firefox 43.0.2
    cpe:2.3:a:mozilla:firefox:43.0.2
  • Mozilla Firefox 43.0.3
    cpe:2.3:a:mozilla:firefox:43.0.3
  • Mozilla Firefox 43.0.4
    cpe:2.3:a:mozilla:firefox:43.0.4
  • Mozilla Firefox 44.0
    cpe:2.3:a:mozilla:firefox:44.0
  • Mozilla Firefox 44.0.1
    cpe:2.3:a:mozilla:firefox:44.0.1
  • Mozilla Firefox 44.0.2
    cpe:2.3:a:mozilla:firefox:44.0.2
  • Mozilla Firefox 45.0
    cpe:2.3:a:mozilla:firefox:45.0
  • Mozilla Firefox 45.0.1
    cpe:2.3:a:mozilla:firefox:45.0.1
  • Mozilla Firefox 45.0.2
    cpe:2.3:a:mozilla:firefox:45.0.2
  • Mozilla Firefox 45.1.1
    cpe:2.3:a:mozilla:firefox:45.1.1
  • Mozilla Firefox 45.2.0
    cpe:2.3:a:mozilla:firefox:45.2.0
  • Mozilla Firefox 45.3.0
    cpe:2.3:a:mozilla:firefox:45.3.0
  • Mozilla Firefox 45.4.0
    cpe:2.3:a:mozilla:firefox:45.4.0
  • Mozilla Firefox 45.5.0
    cpe:2.3:a:mozilla:firefox:45.5.0
  • Mozilla Firefox 45.5.1
    cpe:2.3:a:mozilla:firefox:45.5.1
  • Mozilla Firefox 45.6.0
    cpe:2.3:a:mozilla:firefox:45.6.0
  • Mozilla Firefox 45.7.0
    cpe:2.3:a:mozilla:firefox:45.7.0
  • Mozilla Firefox 45.8.0
    cpe:2.3:a:mozilla:firefox:45.8.0
  • Mozilla Firefox 45.9.0
    cpe:2.3:a:mozilla:firefox:45.9.0
  • Mozilla Firefox 46.0
    cpe:2.3:a:mozilla:firefox:46.0
  • Mozilla Firefox 46.0.1
    cpe:2.3:a:mozilla:firefox:46.0.1
  • Mozilla Firefox 47.0
    cpe:2.3:a:mozilla:firefox:47.0
  • Mozilla Firefox 47.0.1
    cpe:2.3:a:mozilla:firefox:47.0.1
  • Mozilla Firefox 47.0.2
    cpe:2.3:a:mozilla:firefox:47.0.2
  • Mozilla Firefox 48.0
    cpe:2.3:a:mozilla:firefox:48.0
  • Mozilla Firefox 48.0.1
    cpe:2.3:a:mozilla:firefox:48.0.1
  • Mozilla Firefox 48.0.2
    cpe:2.3:a:mozilla:firefox:48.0.2
  • Mozilla Firefox 49.0
    cpe:2.3:a:mozilla:firefox:49.0
  • Mozilla Firefox 49.0.1
    cpe:2.3:a:mozilla:firefox:49.0.1
  • Mozilla Firefox 49.0.2
    cpe:2.3:a:mozilla:firefox:49.0.2
  • Mozilla Firefox 50.0
    cpe:2.3:a:mozilla:firefox:50.0
  • Mozilla Firefox 50.0.1
    cpe:2.3:a:mozilla:firefox:50.0.1
  • Mozilla Firefox 50.0.2
    cpe:2.3:a:mozilla:firefox:50.0.2
  • Mozilla Firefox 51.0
    cpe:2.3:a:mozilla:firefox:51.0
  • Mozilla Firefox 51.0.1
    cpe:2.3:a:mozilla:firefox:51.0.1
  • Mozilla Firefox 52.0
    cpe:2.3:a:mozilla:firefox:52.0
  • Mozilla Firefox 52.0.1
    cpe:2.3:a:mozilla:firefox:52.0.1
  • Mozilla Firefox 52.0.2
    cpe:2.3:a:mozilla:firefox:52.0.2
  • Mozilla Firefox 52.1.0
    cpe:2.3:a:mozilla:firefox:52.1.0
  • Mozilla Firefox 52.1.1
    cpe:2.3:a:mozilla:firefox:52.1.1
  • Mozilla Firefox 52.1.2
    cpe:2.3:a:mozilla:firefox:52.1.2
  • Mozilla Firefox 52.2.0
    cpe:2.3:a:mozilla:firefox:52.2.0
  • Mozilla Firefox 52.2.1
    cpe:2.3:a:mozilla:firefox:52.2.1
  • Mozilla Firefox 52.3.0
    cpe:2.3:a:mozilla:firefox:52.3.0
  • Mozilla Firefox 52.4.0
    cpe:2.3:a:mozilla:firefox:52.4.0
  • Mozilla Firefox 52.4.1
    cpe:2.3:a:mozilla:firefox:52.4.1
  • Mozilla Firefox 52.5.0
    cpe:2.3:a:mozilla:firefox:52.5.0
  • Mozilla Firefox 52.5.2
    cpe:2.3:a:mozilla:firefox:52.5.2
  • Mozilla Firefox 52.5.3
    cpe:2.3:a:mozilla:firefox:52.5.3
  • Mozilla Firefox 52.6.0
    cpe:2.3:a:mozilla:firefox:52.6.0
  • Mozilla Firefox 52.7.0
    cpe:2.3:a:mozilla:firefox:52.7.0
  • Mozilla Firefox 52.7.1
    cpe:2.3:a:mozilla:firefox:52.7.1
  • Mozilla Firefox 52.7.2
    cpe:2.3:a:mozilla:firefox:52.7.2
  • Mozilla Firefox 52.7.3
    cpe:2.3:a:mozilla:firefox:52.7.3
  • Mozilla Firefox 52.7.4
    cpe:2.3:a:mozilla:firefox:52.7.4
  • Mozilla Firefox 52.8.0
    cpe:2.3:a:mozilla:firefox:52.8.0
  • Mozilla Firefox 52.8.1
    cpe:2.3:a:mozilla:firefox:52.8.1
  • Mozilla Firefox 52.9.0
    cpe:2.3:a:mozilla:firefox:52.9.0
  • Mozilla Firefox 53.0
    cpe:2.3:a:mozilla:firefox:53.0
  • Mozilla Firefox 53.0.2
    cpe:2.3:a:mozilla:firefox:53.0.2
  • Mozilla Firefox 53.0.3
    cpe:2.3:a:mozilla:firefox:53.0.3
  • Mozilla Firefox 54.0
    cpe:2.3:a:mozilla:firefox:54.0
  • Mozilla Firefox 54.0.1
    cpe:2.3:a:mozilla:firefox:54.0.1
  • Mozilla Firefox 55.0
    cpe:2.3:a:mozilla:firefox:55.0
  • Mozilla Firefox 55.0.1
    cpe:2.3:a:mozilla:firefox:55.0.1
  • Mozilla Firefox 55.0.2
    cpe:2.3:a:mozilla:firefox:55.0.2
  • Mozilla Firefox 55.0.3
    cpe:2.3:a:mozilla:firefox:55.0.3
  • Mozilla Firefox 56.0
    cpe:2.3:a:mozilla:firefox:56.0
  • Mozilla Firefox 56.0.1
    cpe:2.3:a:mozilla:firefox:56.0.1
  • Mozilla Firefox 56.0.2
    cpe:2.3:a:mozilla:firefox:56.0.2
  • Mozilla Firefox 57.0
    cpe:2.3:a:mozilla:firefox:57.0
  • Mozilla Firefox 57.0.1
    cpe:2.3:a:mozilla:firefox:57.0.1
  • Mozilla Firefox 57.0.2
    cpe:2.3:a:mozilla:firefox:57.0.2
  • Mozilla Firefox 57.0.3
    cpe:2.3:a:mozilla:firefox:57.0.3
  • Mozilla Firefox 57.0.4
    cpe:2.3:a:mozilla:firefox:57.0.4
  • Mozilla Firefox 58.0
    cpe:2.3:a:mozilla:firefox:58.0
  • Mozilla Firefox 58.0.1
    cpe:2.3:a:mozilla:firefox:58.0.1
  • Mozilla Firefox 58.0.2
    cpe:2.3:a:mozilla:firefox:58.0.2
  • Mozilla Firefox 59.0
    cpe:2.3:a:mozilla:firefox:59.0
  • Mozilla Firefox 59.0.1
    cpe:2.3:a:mozilla:firefox:59.0.1
  • Mozilla Firefox 59.0.2
    cpe:2.3:a:mozilla:firefox:59.0.2
  • Mozilla Firefox 59.0.3
    cpe:2.3:a:mozilla:firefox:59.0.3
  • Mozilla Firefox 60.0
    cpe:2.3:a:mozilla:firefox:60.0
  • Mozilla Firefox 60.0.1
    cpe:2.3:a:mozilla:firefox:60.0.1
  • Mozilla Firefox 60.0.2
    cpe:2.3:a:mozilla:firefox:60.0.2
  • Mozilla Firefox 60.1.0
    cpe:2.3:a:mozilla:firefox:60.1.0
  • Mozilla Firefox 60.2.0
    cpe:2.3:a:mozilla:firefox:60.2.0
  • Mozilla Firefox 60.2.1
    cpe:2.3:a:mozilla:firefox:60.2.1
  • Mozilla Firefox 60.2.2
    cpe:2.3:a:mozilla:firefox:60.2.2
  • Mozilla Firefox 60.3.0
    cpe:2.3:a:mozilla:firefox:60.3.0
  • Mozilla Firefox 60.4.0
    cpe:2.3:a:mozilla:firefox:60.4.0
  • Mozilla Firefox 60.5.0
    cpe:2.3:a:mozilla:firefox:60.5.0
  • Mozilla Firefox 61.0
    cpe:2.3:a:mozilla:firefox:61.0
  • Mozilla Firefox 61.0.1
    cpe:2.3:a:mozilla:firefox:61.0.1
  • Mozilla Firefox 61.0.2
    cpe:2.3:a:mozilla:firefox:61.0.2
  • Mozilla Firefox 62.0
    cpe:2.3:a:mozilla:firefox:62.0
  • Mozilla Firefox 62.0.2
    cpe:2.3:a:mozilla:firefox:62.0.2
  • Mozilla Firefox 62.0.3
    cpe:2.3:a:mozilla:firefox:62.0.3
  • Mozilla Firefox 63.0
    cpe:2.3:a:mozilla:firefox:63.0
  • Mozilla Firefox 63.0.1
    cpe:2.3:a:mozilla:firefox:63.0.1
  • Mozilla Firefox 63.0.3
    cpe:2.3:a:mozilla:firefox:63.0.3
  • Mozilla Firefox 64.0
    cpe:2.3:a:mozilla:firefox:64.0
  • Mozilla Firefox 64.0.2
    cpe:2.3:a:mozilla:firefox:64.0.2
  • Mozilla Firefox Extended Support Release (ESR) 10.0
    cpe:2.3:a:mozilla:firefox_esr:10.0
  • Mozilla Firefox Extended Support Release (ESR) 10.1
    cpe:2.3:a:mozilla:firefox_esr:10.0.1
  • Mozilla Firefox Extended Support Release (ESR) 10.0.2
    cpe:2.3:a:mozilla:firefox_esr:10.0.2
  • Mozilla Firefox Extended Support Release (ESR) 10.0.3
    cpe:2.3:a:mozilla:firefox_esr:10.0.3
  • Mozilla Firefox Extended Support Release (ESR) 10.0.4
    cpe:2.3:a:mozilla:firefox_esr:10.0.4
  • Mozilla Firefox Extended Support Release (ESR) 10.0.5
    cpe:2.3:a:mozilla:firefox_esr:10.0.5
  • Mozilla Firefox Extended Support Release (ESR) 10.0.6
    cpe:2.3:a:mozilla:firefox_esr:10.0.6
  • Mozilla Firefox Extended Support Release (ESR) 10.0.7
    cpe:2.3:a:mozilla:firefox_esr:10.0.7
  • Mozilla Firefox Extended Support Release (ESR) 10.0.8
    cpe:2.3:a:mozilla:firefox_esr:10.0.8
  • Mozilla Firefox Extended Support Release (ESR) 10.0.9
    cpe:2.3:a:mozilla:firefox_esr:10.0.9
  • Mozilla Firefox Extended Support Release (ESR) 10.0.10
    cpe:2.3:a:mozilla:firefox_esr:10.0.10
  • Mozilla Firefox Extended Support Release (ESR) 10.0.11
    cpe:2.3:a:mozilla:firefox_esr:10.0.11
  • Mozilla Firefox Extended Support Release (ESR) 10.0.12
    cpe:2.3:a:mozilla:firefox_esr:10.0.12
  • Mozilla Firefox Extended Support Release (ESR) 17.0
    cpe:2.3:a:mozilla:firefox_esr:17.0
  • Mozilla Firefox Extended Support Release (ESR) 17.0.1
    cpe:2.3:a:mozilla:firefox_esr:17.0.1
  • Mozilla Firefox Extended Support Release (ESR) 17.0.2
    cpe:2.3:a:mozilla:firefox_esr:17.0.2
  • Mozilla Firefox Extended Support Release (ESR) 17.0.3
    cpe:2.3:a:mozilla:firefox_esr:17.0.3
  • Mozilla Firefox Extended Support Release (ESR) 17.0.4
    cpe:2.3:a:mozilla:firefox_esr:17.0.4
  • Mozilla Firefox Extended Support Release (ESR) 17.0.5
    cpe:2.3:a:mozilla:firefox_esr:17.0.5
  • Mozilla Firefox Extended Support Release (ESR) 17.0.6
    cpe:2.3:a:mozilla:firefox_esr:17.0.6
  • Mozilla Firefox Extended Support Release (ESR) 17.0.7
    cpe:2.3:a:mozilla:firefox_esr:17.0.7
  • Mozilla Firefox Extended Support Release (ESR) 17.0.8
    cpe:2.3:a:mozilla:firefox_esr:17.0.8
  • Mozilla Firefox Extended Support Release (ESR) 17.0.9
    cpe:2.3:a:mozilla:firefox_esr:17.0.9
  • Mozilla Firefox Extended Support Release (ESR) 17.0.10
    cpe:2.3:a:mozilla:firefox_esr:17.0.10
  • Mozilla Firefox Extended Support Release (ESR) 17.0.11
    cpe:2.3:a:mozilla:firefox_esr:17.0.11
  • Mozilla Firefox Extended Support Release (ESR) 24.0
    cpe:2.3:a:mozilla:firefox_esr:24.0
  • Mozilla Firefox Extended Support Release (ESR) 24.0.1
    cpe:2.3:a:mozilla:firefox_esr:24.0.1
  • Mozilla Firefox Extended Support Release (ESR) 24.0.2
    cpe:2.3:a:mozilla:firefox_esr:24.0.2
  • Mozilla Firefox Extended Support Release (ESR) 24.1.0
    cpe:2.3:a:mozilla:firefox_esr:24.1.0
  • Mozilla Firefox Extended Support Release (ESR) 24.1.1
    cpe:2.3:a:mozilla:firefox_esr:24.1.1
  • Mozilla Firefox Extended Support Release (ESR) 24.2
    cpe:2.3:a:mozilla:firefox_esr:24.2
  • Mozilla Firefox Extended Support Release (ESR) 24.3
    cpe:2.3:a:mozilla:firefox_esr:24.3
  • Mozilla Firefox Extended Support Release (ESR) 24.4
    cpe:2.3:a:mozilla:firefox_esr:24.4
  • Mozilla Firefox Extended Support Release (ESR) 24.5
    cpe:2.3:a:mozilla:firefox_esr:24.5
  • Mozilla Firefox Extended Support Release (ESR) 24.6
    cpe:2.3:a:mozilla:firefox_esr:24.6
  • Mozilla Firefox Extended Support Release (ESR) 24.7
    cpe:2.3:a:mozilla:firefox_esr:24.7
  • Mozilla Firefox Extended Support Release (ESR) 24.8
    cpe:2.3:a:mozilla:firefox_esr:24.8
  • Mozilla Firefox Extended Support Release (ESR) 31.0
    cpe:2.3:a:mozilla:firefox_esr:31.0
  • Mozilla Firefox Extended Support Release (ESR) 31.1
    cpe:2.3:a:mozilla:firefox_esr:31.1
  • Mozilla Firefox Extended Support Release (ESR) 31.1.0
    cpe:2.3:a:mozilla:firefox_esr:31.1.0
  • Mozilla Firefox Extended Support Release (ESR) 31.1.1
    cpe:2.3:a:mozilla:firefox_esr:31.1.1
  • Mozilla Firefox Extended Support Release (ESR) 31.2
    cpe:2.3:a:mozilla:firefox_esr:31.2
  • Mozilla Firefox Extended Support Release (ESR) 31.3
    cpe:2.3:a:mozilla:firefox_esr:31.3
  • Mozilla Firefox Extended Support Release (ESR) 31.3.0
    cpe:2.3:a:mozilla:firefox_esr:31.3.0
  • Mozilla Firefox Extended Support Release (ESR) 31.4
    cpe:2.3:a:mozilla:firefox_esr:31.4
  • Mozilla Firefox Extended Support Release (ESR) 31.5
    cpe:2.3:a:mozilla:firefox_esr:31.5
  • Mozilla Firefox Extended Support Release (ESR) 31.5.1
    cpe:2.3:a:mozilla:firefox_esr:31.5.1
  • Mozilla Firefox Extended Support Release (ESR) 31.5.2
    cpe:2.3:a:mozilla:firefox_esr:31.5.2
  • Mozilla Firefox Extended Support Release (ESR) 31.5.3
    cpe:2.3:a:mozilla:firefox_esr:31.5.3
  • Mozilla Firefox Extended Support Release (ESR) 31.6
    cpe:2.3:a:mozilla:firefox_esr:31.6
  • Mozilla Firefox Extended Support Release (ESR) 31.8
    cpe:2.3:a:mozilla:firefox_esr:31.8
  • Mozilla Firefox ESR 38.0
    cpe:2.3:a:mozilla:firefox_esr:38.0
  • Mozilla Firefox ESR 38.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.0.1
    cpe:2.3:a:mozilla:firefox_esr:38.0.1
  • Mozilla Firefox ESR 38.0.1 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.0.1:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.0.5
    cpe:2.3:a:mozilla:firefox_esr:38.0.5
  • Mozilla Firefox ESR 38.0.5 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.0.5:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.1.0
    cpe:2.3:a:mozilla:firefox_esr:38.1.0
  • Mozilla Firefox ESR 38.1.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.1.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.1.1
    cpe:2.3:a:mozilla:firefox_esr:38.1.1
  • Mozilla Firefox ESR 38.1.1 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.1.1:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.2.0
    cpe:2.3:a:mozilla:firefox_esr:38.2.0
  • Mozilla Firefox ESR 38.2.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.2.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.2.1
    cpe:2.3:a:mozilla:firefox_esr:38.2.1
  • Mozilla Firefox ESR 38.2.1 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.2.1:-:-:-:-:-:x64
  • Mozilla Firefox Extended Support Release (ESR) 38.3.0
    cpe:2.3:a:mozilla:firefox_esr:38.3.0
  • Mozilla Firefox ESR 38.3.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.3.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.4.0
    cpe:2.3:a:mozilla:firefox_esr:38.4.0
  • Mozilla Firefox ESR 38.4.0 (64 bit)
    cpe:2.3:a:mozilla:firefox_esr:38.4.0:-:-:-:-:-:x64
  • Mozilla Firefox ESR 38.5.0
    cpe:2.3:a:mozilla:firefox_esr:38.5.0
  • Mozilla Firefox ESR 38.5.1
    cpe:2.3:a:mozilla:firefox_esr:38.5.1
  • Mozilla Firefox ESR 38.5.2
    cpe:2.3:a:mozilla:firefox_esr:38.5.2
  • Mozilla Firefox Extended Support Release (ESR) 38.6.0
    cpe:2.3:a:mozilla:firefox_esr:38.6.0
  • Mozilla Firefox Extended Support Release (ESR) 38.6.1
    cpe:2.3:a:mozilla:firefox_esr:38.6.1
  • Mozilla Firefox Extended Support Release (ESR) 38.7.0
    cpe:2.3:a:mozilla:firefox_esr:38.7.0
  • Mozilla Firefox Extended Support Release (ESR) 38.7.1
    cpe:2.3:a:mozilla:firefox_esr:38.7.1
  • Mozilla Firefox ESR 38.8.0
    cpe:2.3:a:mozilla:firefox_esr:38.8.0
  • Mozilla Firefox Extended Support Release (ESR) 45.0.2
    cpe:2.3:a:mozilla:firefox_esr:45.0.2
  • Mozilla Firefox Extended Support Release (ESR) 45.1.0
    cpe:2.3:a:mozilla:firefox_esr:45.1.0
  • Mozilla Firefox Extended Support Release (ESR) 45.1.1
    cpe:2.3:a:mozilla:firefox_esr:45.1.1
  • Mozilla Firefox Extended Support Release (ESR) 45.2.0
    cpe:2.3:a:mozilla:firefox_esr:45.2.0
  • Mozilla Firefox Extended Support Release (ESR) 45.3.0
    cpe:2.3:a:mozilla:firefox_esr:45.3.0
  • Mozilla Firefox ESR 45.4.0
    cpe:2.3:a:mozilla:firefox_esr:45.4.0
  • Mozilla Firefox ESR 45.5.0
    cpe:2.3:a:mozilla:firefox_esr:45.5.0
  • Mozilla Thunderbird
    cpe:2.3:a:mozilla:thunderbird
  • Mozilla Thunderbird 0.1
    cpe:2.3:a:mozilla:thunderbird:0.1
  • Mozilla Thunderbird 0.2
    cpe:2.3:a:mozilla:thunderbird:0.2
  • Mozilla Thunderbird 0.3
    cpe:2.3:a:mozilla:thunderbird:0.3
  • Mozilla Thunderbird 0.4
    cpe:2.3:a:mozilla:thunderbird:0.4
  • Mozilla Thunderbird 0.5
    cpe:2.3:a:mozilla:thunderbird:0.5
  • Mozilla Thunderbird 0.6
    cpe:2.3:a:mozilla:thunderbird:0.6
  • Mozilla Thunderbird 0.7
    cpe:2.3:a:mozilla:thunderbird:0.7
  • Mozilla Thunderbird 0.7 Release Candidate
    cpe:2.3:a:mozilla:thunderbird:0.7:rc
  • Mozilla Thunderbird 0.7.1
    cpe:2.3:a:mozilla:thunderbird:0.7.1
  • Mozilla Thunderbird 0.7.2
    cpe:2.3:a:mozilla:thunderbird:0.7.2
  • Mozilla Thunderbird 0.7.3
    cpe:2.3:a:mozilla:thunderbird:0.7.3
  • Mozilla Thunderbird 0.8
    cpe:2.3:a:mozilla:thunderbird:0.8
  • Mozilla Thunderbird 0.9
    cpe:2.3:a:mozilla:thunderbird:0.9
  • Mozilla Thunderbird 1.0
    cpe:2.3:a:mozilla:thunderbird:1.0
  • Mozilla Thunderbird 1.0 Release Candidate
    cpe:2.3:a:mozilla:thunderbird:1.0:rc
  • Mozilla Thunderbird 1.0.2
    cpe:2.3:a:mozilla:thunderbird:1.0.2
  • Mozilla Thunderbird 1.0.5
    cpe:2.3:a:mozilla:thunderbird:1.0.5
  • Mozilla Thunderbird 1.0.6
    cpe:2.3:a:mozilla:thunderbird:1.0.6
  • Mozilla Thunderbird 1.0.7
    cpe:2.3:a:mozilla:thunderbird:1.0.7
  • Mozilla Thunderbird 1.0.8
    cpe:2.3:a:mozilla:thunderbird:1.0.8
  • Mozilla Thunderbird 1.1 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:1.1:alpha1
  • Mozilla Thunderbird 1.1 Alpha 2
    cpe:2.3:a:mozilla:thunderbird:1.1:alpha2
  • Mozilla Thunderbird 1.5
    cpe:2.3:a:mozilla:thunderbird:1.5
  • Mozilla Thunderbird 1.5 Beta 1
    cpe:2.3:a:mozilla:thunderbird:1.5:beta1
  • Mozilla Thunderbird 1.5 Beta 2
    cpe:2.3:a:mozilla:thunderbird:1.5:beta2
  • Mozilla Thunderbird 1.5 Release Candidate 1
    cpe:2.3:a:mozilla:thunderbird:1.5:rc1
  • Mozilla Thunderbird 1.5 Release Candidate 2
    cpe:2.3:a:mozilla:thunderbird:1.5:rc2
  • Mozilla Thunderbird 1.5.0.2
    cpe:2.3:a:mozilla:thunderbird:1.5.0.2
  • Mozilla Thunderbird 1.5.0.4
    cpe:2.3:a:mozilla:thunderbird:1.5.0.4
  • Mozilla Thunderbird 1.5.0.5
    cpe:2.3:a:mozilla:thunderbird:1.5.0.5
  • Mozilla Thunderbird 1.5.0.7
    cpe:2.3:a:mozilla:thunderbird:1.5.0.7
  • Mozilla Thunderbird 1.5.0.8
    cpe:2.3:a:mozilla:thunderbird:1.5.0.8
  • Mozilla Thunderbird 1.5.0.9
    cpe:2.3:a:mozilla:thunderbird:1.5.0.9
  • Mozilla Thunderbird 1.5.0.10
    cpe:2.3:a:mozilla:thunderbird:1.5.0.10
  • Mozilla Thunderbird 1.5.0.12
    cpe:2.3:a:mozilla:thunderbird:1.5.0.12
  • Mozilla Thunderbird 1.5.0.13
    cpe:2.3:a:mozilla:thunderbird:1.5.0.13
  • Mozilla Thunderbird 1.5.0.14
    cpe:2.3:a:mozilla:thunderbird:1.5.0.14
  • Mozilla Thunderbird 2.0
    cpe:2.3:a:mozilla:thunderbird:2.0
  • Mozilla Thunderbird 2.0 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:2.0:alpha1
  • Mozilla Thunderbird 2.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:2.0:beta1
  • Mozilla Thunderbird 2.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:2.0:beta2
  • Mozilla Thunderbird 2.0.0.0
    cpe:2.3:a:mozilla:thunderbird:2.0.0.0
  • Mozilla Thunderbird 2.0.0.0 Release Candidate 1
    cpe:2.3:a:mozilla:thunderbird:2.0.0.0:rc1
  • Mozilla Thunderbird 2.0.0.4
    cpe:2.3:a:mozilla:thunderbird:2.0.0.4
  • Mozilla Thunderbird 2.0.0.5
    cpe:2.3:a:mozilla:thunderbird:2.0.0.5
  • Mozilla Thunderbird 2.0.0.6
    cpe:2.3:a:mozilla:thunderbird:2.0.0.6
  • Mozilla Thunderbird 2.0.0.9
    cpe:2.3:a:mozilla:thunderbird:2.0.0.9
  • Mozilla Thunderbird 2.0.0.12
    cpe:2.3:a:mozilla:thunderbird:2.0.0.12
  • Mozilla Thunderbird 2.0.0.14
    cpe:2.3:a:mozilla:thunderbird:2.0.0.14
  • Mozilla Thunderbird 2.0.0.16
    cpe:2.3:a:mozilla:thunderbird:2.0.0.16
  • Mozilla Thunderbird 2.0.0.17
    cpe:2.3:a:mozilla:thunderbird:2.0.0.17
  • Mozilla Thunderbird 2.0.0.18
    cpe:2.3:a:mozilla:thunderbird:2.0.0.18
  • Mozilla Thunderbird 2.0.0.19
    cpe:2.3:a:mozilla:thunderbird:2.0.0.19
  • Mozilla Thunderbird 2.0.0.21
    cpe:2.3:a:mozilla:thunderbird:2.0.0.21
  • Mozilla Thunderbird 2.0.0.22
    cpe:2.3:a:mozilla:thunderbird:2.0.0.22
  • Mozilla Thunderbird 2.0.0.23
    cpe:2.3:a:mozilla:thunderbird:2.0.0.23
  • Mozilla Thunderbird 2.0.0.24
    cpe:2.3:a:mozilla:thunderbird:2.0.0.24
  • Mozilla Thunderbird 2.0.0.14
    cpe:2.3:a:mozilla:thunderbird:2.0.14
  • Mozilla Thunderbird 3.0
    cpe:2.3:a:mozilla:thunderbird:3.0
  • Mozilla Thunderbird 3.0 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:3.0:alpha1
  • Mozilla Thunderbird 3.0 Alpha 2
    cpe:2.3:a:mozilla:thunderbird:3.0:alpha2
  • Mozilla Thunderbird 3.0 Alpha 3
    cpe:2.3:a:mozilla:thunderbird:3.0:alpha3
  • Mozilla Thunderbird 3.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:3.0:beta1
  • Mozilla Thunderbird 3.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:3.0:beta2
  • Mozilla Thunderbird 3.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:3.0:beta3
  • Mozilla Thunderbird 3.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:3.0:beta4
  • Mozilla Thunderbird 3.0 Release Candidate 1
    cpe:2.3:a:mozilla:thunderbird:3.0:rc1
  • Mozilla Thunderbird 3.0 Release Candidate 2
    cpe:2.3:a:mozilla:thunderbird:3.0:rc2
  • Mozilla Thunderbird 3.0.1
    cpe:2.3:a:mozilla:thunderbird:3.0.1
  • Mozilla Thunderbird 3.0.2
    cpe:2.3:a:mozilla:thunderbird:3.0.2
  • Mozilla Thunderbird 3.0.3
    cpe:2.3:a:mozilla:thunderbird:3.0.3
  • Mozilla Thunderbird 3.0.4
    cpe:2.3:a:mozilla:thunderbird:3.0.4
  • Mozilla Thunderbird 3.0.5
    cpe:2.3:a:mozilla:thunderbird:3.0.5
  • Mozilla Thunderbird 3.0.6
    cpe:2.3:a:mozilla:thunderbird:3.0.6
  • Mozilla Thunderbird 3.0.7
    cpe:2.3:a:mozilla:thunderbird:3.0.7
  • Mozilla Thunderbird 3.0.8
    cpe:2.3:a:mozilla:thunderbird:3.0.8
  • Mozilla Thunderbird 3.0.9
    cpe:2.3:a:mozilla:thunderbird:3.0.9
  • Mozilla Thunderbird 3.0.10
    cpe:2.3:a:mozilla:thunderbird:3.0.10
  • Mozilla Thunderbird 3.0.11
    cpe:2.3:a:mozilla:thunderbird:3.0.11
  • Mozilla Thunderbird 3.1
    cpe:2.3:a:mozilla:thunderbird:3.1
  • Mozilla Thunderbird 3.1 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:3.1:alpha1
  • Mozilla Thunderbird 3.1 Beta 1
    cpe:2.3:a:mozilla:thunderbird:3.1:beta1
  • Mozilla Thunderbird 3.1 Beta 2
    cpe:2.3:a:mozilla:thunderbird:3.1:beta2
  • Mozilla Thunderbird 3.1 Release Candidate 1
    cpe:2.3:a:mozilla:thunderbird:3.1:rc1
  • Mozilla Thunderbird 3.1 Release Candidate 2
    cpe:2.3:a:mozilla:thunderbird:3.1:rc2
  • Mozilla Thunderbird 3.1.1
    cpe:2.3:a:mozilla:thunderbird:3.1.1
  • Mozilla Thunderbird 3.1.2
    cpe:2.3:a:mozilla:thunderbird:3.1.2
  • Mozilla Thunderbird 3.1.3
    cpe:2.3:a:mozilla:thunderbird:3.1.3
  • Mozilla Thunderbird 3.1.4
    cpe:2.3:a:mozilla:thunderbird:3.1.4
  • Mozilla Thunderbird 3.1.5
    cpe:2.3:a:mozilla:thunderbird:3.1.5
  • Mozilla Thunderbird 3.1.6
    cpe:2.3:a:mozilla:thunderbird:3.1.6
  • Mozilla Thunderbird 3.1.7
    cpe:2.3:a:mozilla:thunderbird:3.1.7
  • Mozilla Thunderbird 3.1.8
    cpe:2.3:a:mozilla:thunderbird:3.1.8
  • Mozilla Thunderbird 3.1.9
    cpe:2.3:a:mozilla:thunderbird:3.1.9
  • Mozilla Thunderbird 3.1.10
    cpe:2.3:a:mozilla:thunderbird:3.1.10
  • Mozilla Thunderbird 3.1.11
    cpe:2.3:a:mozilla:thunderbird:3.1.11
  • Mozilla Thunderbird 3.1.12
    cpe:2.3:a:mozilla:thunderbird:3.1.12
  • Mozilla Thunderbird 3.1.13
    cpe:2.3:a:mozilla:thunderbird:3.1.13
  • Mozilla Thunderbird 3.1.14
    cpe:2.3:a:mozilla:thunderbird:3.1.14
  • Mozilla Thunderbird 3.1.15
    cpe:2.3:a:mozilla:thunderbird:3.1.15
  • Mozilla Thunderbird 3.1.16
    cpe:2.3:a:mozilla:thunderbird:3.1.16
  • Mozilla Thunderbird 3.1.17
    cpe:2.3:a:mozilla:thunderbird:3.1.17
  • Mozilla Thunderbird 3.1.18
    cpe:2.3:a:mozilla:thunderbird:3.1.18
  • Mozilla Thunderbird 3.1.19
    cpe:2.3:a:mozilla:thunderbird:3.1.19
  • Mozilla Thunderbird 3.1.20
    cpe:2.3:a:mozilla:thunderbird:3.1.20
  • Mozilla Thunderbird 3.3 Alpha 1
    cpe:2.3:a:mozilla:thunderbird:3.3:alpha1
  • Mozilla Thunderbird 3.3 Alpha 2
    cpe:2.3:a:mozilla:thunderbird:3.3:alpha2
  • Mozilla Thunderbird 3.3 Alpha 3
    cpe:2.3:a:mozilla:thunderbird:3.3:alpha3
  • Mozilla Thunderbird 5.0
    cpe:2.3:a:mozilla:thunderbird:5.0
  • Mozilla Thunderbird 5.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:5.0:beta1
  • Mozilla Thunderbird 5.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:5.0:beta2
  • Mozilla Thunderbird 6.0
    cpe:2.3:a:mozilla:thunderbird:6.0
  • Mozilla Thunderbird 6.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:6.0:beta1
  • Mozilla Thunderbird 6.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:6.0:beta2
  • Mozilla Thunderbird 6.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:6.0:beta3
  • Mozilla Thunderbird 6.0.1
    cpe:2.3:a:mozilla:thunderbird:6.0.1
  • Mozilla Thunderbird 6.0.2
    cpe:2.3:a:mozilla:thunderbird:6.0.2
  • Mozilla Thunderbird 7.0
    cpe:2.3:a:mozilla:thunderbird:7.0
  • Mozilla Thunderbird 7.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:7.0:beta1
  • Mozilla Thunderbird 7.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:7.0:beta2
  • Mozilla Thunderbird 7.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:7.0:beta3
  • Mozilla Thunderbird 7.0.1
    cpe:2.3:a:mozilla:thunderbird:7.0.1
  • Mozilla Thunderbird 8.0
    cpe:2.3:a:mozilla:thunderbird:8.0
  • Mozilla Thunderbird 8.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:8.0:beta1
  • Mozilla Thunderbird 8.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:8.0:beta2
  • Mozilla Thunderbird 8.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:8.0:beta3
  • Mozilla Thunderbird 8.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:8.0:beta4
  • Mozilla Thunderbird 8.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:8.0:beta5
  • Mozilla Thunderbird 9.0
    cpe:2.3:a:mozilla:thunderbird:9.0
  • Mozilla Thunderbird 9.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:9.0:beta1
  • Mozilla Thunderbird 9.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:9.0:beta2
  • Mozilla Thunderbird 9.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:9.0:beta3
  • Mozilla Thunderbird 9.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:9.0:beta4
  • Mozilla Thunderbird 9.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:9.0:beta5
  • Mozilla Thunderbird 9.0.1
    cpe:2.3:a:mozilla:thunderbird:9.0.1
  • Mozilla Thunderbird 10.0
    cpe:2.3:a:mozilla:thunderbird:10.0
  • Mozilla Thunderbird 10.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:10.0:beta1
  • Mozilla Thunderbird 10.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:10.0:beta2
  • Mozilla Thunderbird 10.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:10.0:beta3
  • Mozilla Thunderbird 10.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:10.0:beta4
  • Mozilla Thunderbird 10.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:10.0:beta5
  • Mozilla Thunderbird 10.0.1
    cpe:2.3:a:mozilla:thunderbird:10.0.1
  • Mozilla Thunderbird 10.0.2
    cpe:2.3:a:mozilla:thunderbird:10.0.2
  • Mozilla Thunderbird 11.0
    cpe:2.3:a:mozilla:thunderbird:11.0
  • Mozilla Thunderbird 11.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:11.0:beta1
  • Mozilla Thunderbird 11.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:11.0:beta2
  • Mozilla Thunderbird 11.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:11.0:beta3
  • Mozilla Thunderbird 11.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:11.0:beta4
  • Mozilla Thunderbird 11.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:11.0:beta5
  • Mozilla Thunderbird 11.0.1
    cpe:2.3:a:mozilla:thunderbird:11.0.1
  • Mozilla Thunderbird 12.0
    cpe:2.3:a:mozilla:thunderbird:12.0
  • Mozilla Thunderbird 12.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:12.0:beta1
  • Mozilla Thunderbird 12.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:12.0:beta2
  • Mozilla Thunderbird 12.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:12.0:beta3
  • Mozilla Thunderbird 12.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:12.0:beta4
  • Mozilla Thunderbird 12.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:12.0:beta5
  • Mozilla Thunderbird 12.0.1
    cpe:2.3:a:mozilla:thunderbird:12.0.1
  • Mozilla Thunderbird 13.0
    cpe:2.3:a:mozilla:thunderbird:13.0
  • Mozilla Thunderbird 13.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:13.0:beta1
  • Mozilla Thunderbird 13.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:13.0:beta2
  • Mozilla Thunderbird 13.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:13.0:beta3
  • Mozilla Thunderbird 13.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:13.0:beta4
  • Mozilla Thunderbird 13.0.1
    cpe:2.3:a:mozilla:thunderbird:13.0.1
  • Mozilla Thunderbird 14.0
    cpe:2.3:a:mozilla:thunderbird:14.0
  • Mozilla Thunderbird 14.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:14.0:beta1
  • Mozilla Thunderbird 14.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:14.0:beta2
  • Mozilla Thunderbird 14.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:14.0:beta3
  • Mozilla Thunderbird 14.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:14.0:beta4
  • Mozilla Thunderbird 14.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:14.0:beta5
  • Mozilla Thunderbird 15.0
    cpe:2.3:a:mozilla:thunderbird:15.0
  • Mozilla Thunderbird 15.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:15.0:beta1
  • Mozilla Thunderbird 15.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:15.0:beta2
  • Mozilla Thunderbird 15.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:15.0:beta3
  • Mozilla Thunderbird 15.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:15.0:beta4
  • Mozilla Thunderbird 15.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:15.0:beta5
  • Mozilla Thunderbird 15.0.1
    cpe:2.3:a:mozilla:thunderbird:15.0.1
  • Mozilla Thunderbird 16.0
    cpe:2.3:a:mozilla:thunderbird:16.0
  • Mozilla Thunderbird 16.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:16.0:beta1
  • Mozilla Thunderbird 16.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:16.0:beta2
  • Mozilla Thunderbird 16.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:16.0:beta3
  • Mozilla Thunderbird 16.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:16.0:beta4
  • Mozilla Thunderbird 16.0.1
    cpe:2.3:a:mozilla:thunderbird:16.0.1
  • Mozilla Thunderbird 16.0.2
    cpe:2.3:a:mozilla:thunderbird:16.0.2
  • Mozilla Thunderbird 17.0
    cpe:2.3:a:mozilla:thunderbird:17.0
  • Mozilla Thunderbird 17.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:17.0:beta1
  • Mozilla Thunderbird 17.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:17.0:beta2
  • Mozilla Thunderbird 17.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:17.0:beta3
  • Mozilla Thunderbird 17.0.2
    cpe:2.3:a:mozilla:thunderbird:17.0.2
  • Mozilla Thunderbird 17.0.3
    cpe:2.3:a:mozilla:thunderbird:17.0.3
  • Mozilla Thunderbird 17.0.4
    cpe:2.3:a:mozilla:thunderbird:17.0.4
  • Mozilla Thunderbird 17.0.5
    cpe:2.3:a:mozilla:thunderbird:17.0.5
  • Mozilla Thunderbird 17.0.6
    cpe:2.3:a:mozilla:thunderbird:17.0.6
  • Mozilla Thunderbird 17.0.7
    cpe:2.3:a:mozilla:thunderbird:17.0.7
  • Mozilla Thunderbird 17.0.8
    cpe:2.3:a:mozilla:thunderbird:17.0.8
  • Mozilla Thunderbird 17.0.9
    cpe:2.3:a:mozilla:thunderbird:17.0.9
  • Mozilla Thunderbird 17.0.10
    cpe:2.3:a:mozilla:thunderbird:17.0.10
  • Mozilla Thunderbird 18.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:18.0:beta1
  • Mozilla Thunderbird 19.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:19.0:beta1
  • Mozilla Thunderbird 20.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:20.0:beta1
  • Mozilla Thunderbird 21.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:21.0:beta1
  • Mozilla Thunderbird 22.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:22.0:beta1
  • Mozilla Thunderbird 23.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:23.0:beta1
  • Mozilla Thunderbird 24.0
    cpe:2.3:a:mozilla:thunderbird:24.0
  • Mozilla Thunderbird 24.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:24.0:beta1
  • Mozilla Thunderbird 24.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:24.0:beta2
  • Mozilla Thunderbird 24.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:24.0:beta3
  • Mozilla Thunderbird 24.0.1
    cpe:2.3:a:mozilla:thunderbird:24.0.1
  • Mozilla Thunderbird 24.1.0
    cpe:2.3:a:mozilla:thunderbird:24.1.0
  • Mozilla Thunderbird 24.1.1
    cpe:2.3:a:mozilla:thunderbird:24.1.1
  • Mozilla Thunderbird 24.2.0
    cpe:2.3:a:mozilla:thunderbird:24.2.0
  • Mozilla Thunderbird 24.3.0
    cpe:2.3:a:mozilla:thunderbird:24.3.0
  • Mozilla Thunderbird 24.4.0
    cpe:2.3:a:mozilla:thunderbird:24.4.0
  • Mozilla Thunderbird 24.5.0
    cpe:2.3:a:mozilla:thunderbird:24.5.0
  • Mozilla Thunderbird 24.6.0
    cpe:2.3:a:mozilla:thunderbird:24.6.0
  • Mozilla Thunderbird 24.7.0
    cpe:2.3:a:mozilla:thunderbird:24.7.0
  • Mozilla Thunderbird 24.8.0
    cpe:2.3:a:mozilla:thunderbird:24.8.0
  • Mozilla Thunderbird 24.8.1
    cpe:2.3:a:mozilla:thunderbird:24.8.1
  • Mozilla Thunderbird 25.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:25.0:beta1
  • Mozilla Thunderbird 26.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:26.0:beta1
  • Mozilla Thunderbird 27.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:27.0:beta1
  • Mozilla Thunderbird 28.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:28.0:beta1
  • Mozilla Thunderbird 29.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:29.0:beta1
  • Mozilla Thunderbird 30.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:30.0:beta1
  • Mozilla Thunderbird 31.0
    cpe:2.3:a:mozilla:thunderbird:31.0
  • Mozilla Thunderbird 31.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:31.0:beta1
  • Mozilla Thunderbird 31.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:31.0:beta2
  • Mozilla Thunderbird 31.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:31.0:beta3
  • Mozilla Thunderbird 31.1.0
    cpe:2.3:a:mozilla:thunderbird:31.1.0
  • Mozilla Thunderbird 31.1.1
    cpe:2.3:a:mozilla:thunderbird:31.1.1
  • Mozilla Thunderbird 31.1.2
    cpe:2.3:a:mozilla:thunderbird:31.1.2
  • Mozilla Thunderbird 31.2.0
    cpe:2.3:a:mozilla:thunderbird:31.2.0
  • Mozilla Thunderbird 31.3.0
    cpe:2.3:a:mozilla:thunderbird:31.3.0
  • Mozilla Thunderbird 31.4.0
    cpe:2.3:a:mozilla:thunderbird:31.4.0
  • Mozilla Thunderbird 31.5.0
    cpe:2.3:a:mozilla:thunderbird:31.5.0
  • Mozilla Thunderbird 31.6.0
    cpe:2.3:a:mozilla:thunderbird:31.6.0
  • Mozilla Thunderbird 31.7.0
    cpe:2.3:a:mozilla:thunderbird:31.7.0
  • Mozilla Thunderbird 31.8.0
    cpe:2.3:a:mozilla:thunderbird:31.8.0
  • Mozilla Thunderbird 32.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:32.0:beta1
  • Mozilla Thunderbird 33.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:33.0:beta1
  • Mozilla Thunderbird 34.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:34.0:beta1
  • Mozilla Thunderbird 36.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:36.0:beta1
  • Mozilla Thunderbird 37.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:37.0:beta1
  • Mozilla Thunderbird 38.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:38.0:beta1
  • Mozilla Thunderbird 38.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:38.0:beta2
  • Mozilla Thunderbird 38.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:38.0:beta3
  • Mozilla Thunderbird 38.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:38.0:beta4
  • Mozilla Thunderbird 38.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:38.0:beta5
  • Mozilla Thunderbird 38.0 Beta 6
    cpe:2.3:a:mozilla:thunderbird:38.0:beta6
  • Mozilla Thunderbird 38.0.1
    cpe:2.3:a:mozilla:thunderbird:38.0.1
  • Mozilla Thunderbird 38.1.0
    cpe:2.3:a:mozilla:thunderbird:38.1.0
  • Mozilla Thunderbird 38.2.0
    cpe:2.3:a:mozilla:thunderbird:38.2.0
  • Mozilla Thunderbird 38.3.0
    cpe:2.3:a:mozilla:thunderbird:38.3.0
  • Mozilla Thunderbird 38.4.0
    cpe:2.3:a:mozilla:thunderbird:38.4.0
  • Mozilla Thunderbird 38.5.0
    cpe:2.3:a:mozilla:thunderbird:38.5.0
  • Mozilla Thunderbird 38.5.1
    cpe:2.3:a:mozilla:thunderbird:38.5.1
  • Mozilla Thunderbird 38.6.0
    cpe:2.3:a:mozilla:thunderbird:38.6.0
  • Mozilla Thunderbird 38.7.0
    cpe:2.3:a:mozilla:thunderbird:38.7.0
  • Mozilla Thunderbird 38.7.1
    cpe:2.3:a:mozilla:thunderbird:38.7.1
  • Mozilla Thunderbird 38.7.2
    cpe:2.3:a:mozilla:thunderbird:38.7.2
  • Mozilla Thunderbird 38.8.0
    cpe:2.3:a:mozilla:thunderbird:38.8.0
  • Mozilla Thunderbird 40.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:40.0:beta1
  • Mozilla Thunderbird 41.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:41.0:beta1
  • Mozilla Thunderbird 41.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:41.0:beta2
  • Mozilla Thunderbird 42.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:42.0:beta1
  • Mozilla Thunderbird 42.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:42.0:beta2
  • Mozilla Thunderbird 43.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:43.0:beta1
  • Mozilla Thunderbird 44.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:44.0:beta1
  • Mozilla Thunderbird 45.0
    cpe:2.3:a:mozilla:thunderbird:45.0
  • Mozilla Thunderbird 45.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:45.0:beta1
  • Mozilla Thunderbird 45.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:45.0:beta2
  • Mozilla Thunderbird 45.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:45.0:beta3
  • Mozilla Thunderbird 45.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:45.0:beta4
  • Mozilla Thunderbird 45.1 Beta 1
    cpe:2.3:a:mozilla:thunderbird:45.1:beta1
  • Mozilla Thunderbird 45.1.0
    cpe:2.3:a:mozilla:thunderbird:45.1.0
  • Mozilla Thunderbird 45.1.1
    cpe:2.3:a:mozilla:thunderbird:45.1.1
  • Mozilla Thunderbird 45.2 Beta 1
    cpe:2.3:a:mozilla:thunderbird:45.2:beta1
  • Mozilla Thunderbird 45.2.0
    cpe:2.3:a:mozilla:thunderbird:45.2.0
  • Mozilla Thunderbird 45.3.0
    cpe:2.3:a:mozilla:thunderbird:45.3.0
  • Mozilla Thunderbird 45.4.0
    cpe:2.3:a:mozilla:thunderbird:45.4.0
  • Mozilla Thunderbird 45.5.0
    cpe:2.3:a:mozilla:thunderbird:45.5.0
  • Mozilla Thunderbird 45.5.1
    cpe:2.3:a:mozilla:thunderbird:45.5.1
  • Mozilla Thunderbird 45.6.0
    cpe:2.3:a:mozilla:thunderbird:45.6.0
  • Mozilla Thunderbird 45.7.0
    cpe:2.3:a:mozilla:thunderbird:45.7.0
  • Mozilla Thunderbird 45.7.1
    cpe:2.3:a:mozilla:thunderbird:45.7.1
  • Mozilla Thunderbird 45.8.0
    cpe:2.3:a:mozilla:thunderbird:45.8.0
  • Mozilla Thunderbird 47.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:47.0:beta1
  • Mozilla Thunderbird 47.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:47.0:beta2
  • Mozilla Thunderbird 49.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:49.0:beta1
  • Mozilla Thunderbird 50.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:50.0:beta1
  • Mozilla Thunderbird 50.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:50.0:beta2
  • Mozilla Thunderbird 50.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:50.0:beta3
  • Mozilla Thunderbird 51.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:51.0:beta1
  • Mozilla Thunderbird 51.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:51.0:beta2
  • Mozilla Thunderbird 52.0
    cpe:2.3:a:mozilla:thunderbird:52.0
  • Mozilla Thunderbird 52.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:52.0:beta1
  • Mozilla Thunderbird 52.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:52.0:beta2
  • Mozilla Thunderbird 52.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:52.0:beta3
  • Mozilla Thunderbird 52.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:52.0:beta4
  • Mozilla Thunderbird 52.0.1
    cpe:2.3:a:mozilla:thunderbird:52.0.1
  • Mozilla Thunderbird 52.1.0
    cpe:2.3:a:mozilla:thunderbird:52.1.0
  • Mozilla Thunderbird 52.1.1
    cpe:2.3:a:mozilla:thunderbird:52.1.1
  • Mozilla Thunderbird 52.2.0
    cpe:2.3:a:mozilla:thunderbird:52.2.0
  • Mozilla Thunderbird 52.2.1
    cpe:2.3:a:mozilla:thunderbird:52.2.1
  • Mozilla Thunderbird 52.3.0
    cpe:2.3:a:mozilla:thunderbird:52.3.0
  • Mozilla Thunderbird 52.4.0
    cpe:2.3:a:mozilla:thunderbird:52.4.0
  • Mozilla Thunderbird 52.5.0
    cpe:2.3:a:mozilla:thunderbird:52.5.0
  • Mozilla Thunderbird 52.5.2
    cpe:2.3:a:mozilla:thunderbird:52.5.2
  • Mozilla Thunderbird 52.6.0
    cpe:2.3:a:mozilla:thunderbird:52.6.0
  • Mozilla Thunderbird 52.7.0
    cpe:2.3:a:mozilla:thunderbird:52.7.0
  • Mozilla Thunderbird 52.8.0
    cpe:2.3:a:mozilla:thunderbird:52.8.0
  • Mozilla Thunderbird 52.9.0
    cpe:2.3:a:mozilla:thunderbird:52.9.0
  • Mozilla Thunderbird 52.9.1
    cpe:2.3:a:mozilla:thunderbird:52.9.1
  • Mozilla Thunderbird 53.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:53.0:beta1
  • Mozilla Thunderbird 53.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:53.0:beta2
  • Mozilla Thunderbird 54.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:54.0:beta1
  • Mozilla Thunderbird 54.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:54.0:beta2
  • Mozilla Thunderbird 54.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:54.0:beta3
  • Mozilla Thunderbird 55.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:55.0:beta2
  • Mozilla Thunderbird 56.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:56.0:beta1
  • Mozilla Thunderbird 56.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:56.0:beta2
  • Mozilla Thunderbird 56.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:56.0:beta3
  • Mozilla Thunderbird 56.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:56.0:beta4
  • Mozilla Thunderbird 57.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:57.0:beta1
  • Mozilla Thunderbird 57.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:57.0:beta2
  • Mozilla Thunderbird 58.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:58.0:beta1
  • Mozilla Thunderbird 58.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:58.0:beta2
  • Mozilla Thunderbird 58.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:58.0:beta3
  • Mozilla Thunderbird 59.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:59.0:beta1
  • Mozilla Thunderbird 59.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:59.0:beta2
  • Mozilla Thunderbird 60.0
    cpe:2.3:a:mozilla:thunderbird:60.0
  • Mozilla Thunderbird 60.0 Beta 1
    cpe:2.3:a:mozilla:thunderbird:60.0:beta1
  • Mozilla Thunderbird 60.0 Beta 10
    cpe:2.3:a:mozilla:thunderbird:60.0:beta10
  • Mozilla Thunderbird 60.0 Beta 11
    cpe:2.3:a:mozilla:thunderbird:60.0:beta11
  • Mozilla Thunderbird 60.0 Beta 2
    cpe:2.3:a:mozilla:thunderbird:60.0:beta2
  • Mozilla Thunderbird 60.0 Beta 3
    cpe:2.3:a:mozilla:thunderbird:60.0:beta3
  • Mozilla Thunderbird 60.0 Beta 4
    cpe:2.3:a:mozilla:thunderbird:60.0:beta4
  • Mozilla Thunderbird 60.0 Beta 5
    cpe:2.3:a:mozilla:thunderbird:60.0:beta5
  • Mozilla Thunderbird 60.0 Beta 6
    cpe:2.3:a:mozilla:thunderbird:60.0:beta6
  • Mozilla Thunderbird 60.0 Beta 7
    cpe:2.3:a:mozilla:thunderbird:60.0:beta7
  • Mozilla Thunderbird 60.0 Beta 8
    cpe:2.3:a:mozilla:thunderbird:60.0:beta8
  • Mozilla Thunderbird 60.0 Beta 9
    cpe:2.3:a:mozilla:thunderbird:60.0:beta9
  • Mozilla Thunderbird 60.2.1
    cpe:2.3:a:mozilla:thunderbird:60.2.1
  • Mozilla Thunderbird 60.3.0
    cpe:2.3:a:mozilla:thunderbird:60.3.0
  • Mozilla Thunderbird 60.4.0
    cpe:2.3:a:mozilla:thunderbird:60.4.0
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.10
    cpe:2.3:o:canonical:ubuntu_linux:18.10
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
  • Red Hat Enterprise Linux Desktop 6.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • Red Hat Enterprise Linux Server 6.0
    cpe:2.3:o:redhat:enterprise_linux_server:6.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • Red Hat Enterprise Linux Server Advanced mission critical Update Support (AUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
  • Red Hat Enterprise Linux Server Extended Update Support (EUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
  • Red Hat Enterprise Linux Server Telecommunications Update Service (TUS) 7.6
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
  • Red Hat Enterprise Linux Workstation 6.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
CVSS
Base: 7.5
Impact:
Exploitability:
CWE CWE-264
CAPEC
  • Accessing, Modifying or Executing Executable Files
    An attack of this type exploits a system's configuration that allows an attacker to either directly access an executable file, for example through shell access; or in a possible worst case allows an attacker to upload a file and then execute it. Web servers, ftp servers, and message oriented middleware systems which have many integration points are particularly vulnerable, because both the programmers and the administrators must be in synch regarding the interfaces and the correct privileges for each interface.
  • Leverage Executable Code in Non-Executable Files
    An attack of this type exploits a system's trust in configuration and resource files, when the executable loads the resource (such as an image file or configuration file) the attacker has modified the file to either execute malicious code directly or manipulate the target process (e.g. application server) to execute based on the malicious configuration parameters. Since systems are increasingly interrelated mashing up resources from local and remote sources the possibility of this attack occurring is high. The attack can be directed at a client system, such as causing buffer overrun through loading seemingly benign image files, as in Microsoft Security Bulletin MS04-028 where specially crafted JPEG files could cause a buffer overrun once loaded into the browser. Another example targets clients reading pdf files. In this case the attacker simply appends javascript to the end of a legitimate url for a pdf (http://www.gnucitizen.org/blog/danger-danger-danger/) http://path/to/pdf/file.pdf#whatever_name_you_want=javascript:your_code_here The client assumes that they are reading a pdf, but the attacker has modified the resource and loaded executable javascript into the client's browser process. The attack can also target server processes. The attacker edits the resource or configuration file, for example a web.xml file used to configure security permissions for a J2EE app server, adding role name "public" grants all users with the public role the ability to use the administration functionality. The server trusts its configuration file to be correct, but when they are manipulated, the attacker gains full control.
  • Blue Boxing
    This type of attack against older telephone switches and trunks has been around for decades. A tone is sent by an adversary to impersonate a supervisor signal which has the effect of rerouting or usurping command of the line. While the US infrastructure proper may not contain widespread vulnerabilities to this type of attack, many companies are connected globally through call centers and business process outsourcing. These international systems may be operated in countries which have not upgraded Telco infrastructure and so are vulnerable to Blue boxing. Blue boxing is a result of failure on the part of the system to enforce strong authorization for administrative functions. While the infrastructure is different than standard current applications like web applications, there are historical lessons to be learned to upgrade the access control for administrative functions.
  • Restful Privilege Elevation
    Rest uses standard HTTP (Get, Put, Delete) style permissions methods, but these are not necessarily correlated generally with back end programs. Strict interpretation of HTTP get methods means that these HTTP Get services should not be used to delete information on the server, but there is no access control mechanism to back up this logic. This means that unless the services are properly ACL'd and the application's service implementation are following these guidelines then an HTTP request can easily execute a delete or update on the server side. The attacker identifies a HTTP Get URL such as http://victimsite/updateOrder, which calls out to a program to update orders on a database or other resource. The URL is not idempotent so the request can be submitted multiple times by the attacker, additionally, the attacker may be able to exploit the URL published as a Get method that actually performs updates (instead of merely retrieving data). This may result in malicious or inadvertent altering of data on the server.
  • Target Programs with Elevated Privileges
    This attack targets programs running with elevated privileges. The attacker would try to leverage a bug in the running program and get arbitrary code to execute with elevated privileges. For instance an attacker would look for programs that write to the system directories or registry keys (such as HKLM, which stores a number of critical Windows environment variables). These programs are typically running with elevated privileges and have usually not been designed with security in mind. Such programs are excellent exploit targets because they yield lots of power when they break. The malicious user try to execute its code at the same level as a privileged system call.
  • Manipulating Input to File System Calls
    An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.
nessus via4
  • NASL family MacOS X Local Security Checks
    NASL id MACOS_THUNDERBIRD_60_5.NASL
    description The version of Thunderbird installed on the remote macOS or Mac OS X host is prior to 60.5. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2019-03 advisory. - A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. (CVE-2018-18500) - An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. (CVE-2018-18505) - A vulnerability in the Libical libary used by Thunderbird can allow remote attackers to cause a denial of service (use-after-free) via a crafted ICS calendar file. (CVE-2016-5824) - Mozilla developers and community members Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, and Christian Holler reported memory safety bugs present in Firefox 64, Firefox ESR 60.4, and Thunderbird 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-18501) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 121599
    published 2019-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121599
    title Mozilla Thunderbird < 60.5
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1678.NASL
    description Multiple security issues have been found in the Thunderbird mail client, which could lead to the execution of arbitrary code, denial of service or spoofing of S/MIME signatures. For Debian 8 'Jessie', these problems have been fixed in version 1:60.5.1-1~deb8u1. We recommend that you upgrade your thunderbird packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-19
    plugin id 122263
    published 2019-02-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122263
    title Debian DLA-1678-1 : thunderbird security update
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2019-0270.NASL
    description From Red Hat Security Advisory 2019:0270 : An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.5.0. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) * libical: Multiple use-after-free vulnerabilities (CVE-2016-5824) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121584
    published 2019-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121584
    title Oracle Linux 7 : thunderbird (ELSA-2019-0270)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2019-0269.NASL
    description From Red Hat Security Advisory 2019:0269 : An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.5.0. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) * libical: Multiple use-after-free vulnerabilities (CVE-2016-5824) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121583
    published 2019-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121583
    title Oracle Linux 6 : thunderbird (ELSA-2019-0269)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4392.NASL
    description Multiple security issues have been found in the Thunderbird mail client, which could lead to the execution of arbitrary code, denial of service or spoofing of S/MIME signatures.
    last seen 2019-02-21
    modified 2019-02-19
    plugin id 122269
    published 2019-02-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122269
    title Debian DSA-4392-1 : thunderbird - security update
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20190204_THUNDERBIRD_ON_SL7_X.NASL
    description This update upgrades Thunderbird to version 60.5.0. Security Fix(es) : - Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) - Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) - Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) - libical: Multiple use-after-free vulnerabilities (CVE-2016-5824)
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121631
    published 2019-02-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121631
    title Scientific Linux Security Update : thunderbird on SL7.x x86_64
  • NASL family Windows
    NASL id MOZILLA_THUNDERBIRD_60_5.NASL
    description The version of Thunderbird installed on the remote Windows host is prior to 60.5. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2019-03 advisory. - A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. (CVE-2018-18500) - An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. (CVE-2018-18505) - A vulnerability in the Libical libary used by Thunderbird can allow remote attackers to cause a denial of service (use-after-free) via a crafted ICS calendar file. (CVE-2016-5824) - Mozilla developers and community members Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, and Christian Holler reported memory safety bugs present in Firefox 64, Firefox ESR 60.4, and Thunderbird 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-18501) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 121600
    published 2019-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121600
    title Mozilla Thunderbird < 60.5
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2019-0219.NASL
    description An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.5.0 ESR. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121551
    published 2019-02-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121551
    title CentOS 7 : firefox (CESA-2019:0219)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2019-0270.NASL
    description An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.5.0. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) * libical: Multiple use-after-free vulnerabilities (CVE-2016-5824) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-11
    plugin id 122065
    published 2019-02-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122065
    title CentOS 7 : thunderbird (CESA-2019:0270)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20190130_FIREFOX_ON_SL6_X.NASL
    description This update upgrades Firefox to version 60.5.0 ESR. Security Fix(es) : - Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) - Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) - Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505)
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121503
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121503
    title Scientific Linux Security Update : firefox on SL6.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2019-0336-1.NASL
    description This update for MozillaFirefox fixes the following issues : Security issues fixed : - CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983). - CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983). - CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-13
    plugin id 122148
    published 2019-02-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122148
    title SUSE SLED12 / SLES12 Security Update : MozillaFirefox (SUSE-SU-2019:0336-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2019-0269.NASL
    description An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.5.0. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) * libical: Multiple use-after-free vulnerabilities (CVE-2016-5824) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-11
    plugin id 122064
    published 2019-02-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122064
    title CentOS 6 : thunderbird (CESA-2019:0269)
  • NASL family Windows
    NASL id MOZILLA_FIREFOX_65_0.NASL
    description The version of Firefox installed on the remote Windows host is prior to 65.0. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2019-01 advisory. - A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. (CVE-2018-18500) - When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations. (CVE-2018-18503) - A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results in a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. (CVE-2018-18504) - An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. (CVE-2018-18505) - When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. (CVE-2018-18506) - Mozilla developers and community members Arthur Iakab, Christoph Diehl, Christian Holler, Kalel, Emilio Cobos lvarez, Cristina Coroiu, Noemi Erli, Natalia Csoregi, Julian Seward, Gary Kwong, Tyson Smith, Yaron Tausky, and Ronald Crane reported memory safety bugs present in Firefox 64. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-18502) - Mozilla developers and community members Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, and Christian Holler reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-18501) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-02-14
    plugin id 121512
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121512
    title Mozilla Firefox < 65.0
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20190130_FIREFOX_ON_SL7_X.NASL
    description This update upgrades Firefox to version 60.5.0 ESR. Security Fix(es) : - Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) - Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) - Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505)
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121504
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121504
    title Scientific Linux Security Update : firefox on SL7.x x86_64
  • NASL family MacOS X Local Security Checks
    NASL id MACOS_FIREFOX_60_5_ESR.NASL
    description The version of Firefox ESR installed on the remote macOS or Mac OS X host is prior to 60.5. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2019-02 advisory. - A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. (CVE-2018-18500) - An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. (CVE-2018-18505) - Mozilla developers and community members Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, and Christian Holler reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-18501) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 121476
    published 2019-01-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121476
    title Mozilla Firefox ESR < 60.5
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2019-0270.NASL
    description An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.5.0. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) * libical: Multiple use-after-free vulnerabilities (CVE-2016-5824) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121586
    published 2019-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121586
    title RHEL 7 : thunderbird (RHSA-2019:0270)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1648.NASL
    description Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or privilege escalation. For Debian 8 'Jessie', these problems have been fixed in version 60.5.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121480
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121480
    title Debian DLA-1648-1 : firefox-esr security update
  • NASL family MacOS X Local Security Checks
    NASL id MACOS_FIREFOX_65_0.NASL
    description The version of Firefox installed on the remote macOS or Mac OS X host is prior to 65.0. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2019-01 advisory. - A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. (CVE-2018-18500) - When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations. (CVE-2018-18503) - A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results in a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. (CVE-2018-18504) - An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. (CVE-2018-18505) - When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. (CVE-2018-18506) - Mozilla developers and community members Arthur Iakab, Christoph Diehl, Christian Holler, Kalel, Emilio Cobos lvarez, Cristina Coroiu, Noemi Erli, Natalia Csoregi, Julian Seward, Gary Kwong, Tyson Smith, Yaron Tausky, and Ronald Crane reported memory safety bugs present in Firefox 64. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-18502) - Mozilla developers and community members Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, and Christian Holler reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-18501) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-02-14
    plugin id 121511
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121511
    title Mozilla Firefox < 65.0
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2019-0218.NASL
    description An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.5.0 ESR. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121550
    published 2019-02-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121550
    title CentOS 6 : firefox (CESA-2019:0218)
  • NASL family Windows
    NASL id MOZILLA_FIREFOX_60_5_ESR.NASL
    description The version of Firefox ESR installed on the remote Windows host is prior to 60.5. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2019-02 advisory. - A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. (CVE-2018-18500) - An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. (CVE-2018-18505) - Mozilla developers and community members Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, and Christian Holler reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2018-18501) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 121477
    published 2019-01-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121477
    title Mozilla Firefox ESR < 60.5
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20190204_THUNDERBIRD_ON_SL6_X.NASL
    description This update upgrades Thunderbird to version 60.5.0. Security Fix(es) : - Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) - Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) - Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) - libical: Multiple use-after-free vulnerabilities (CVE-2016-5824)
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121607
    published 2019-02-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121607
    title Scientific Linux Security Update : thunderbird on SL6.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-182.NASL
    description This update for MozillaThunderbird to version 60.5.0 fixes the following issues : Security vulnerabilities addressed (MFSA 2019-03 boo#1122983 MFSA 2018-31) : - CVE-2018-18500: Use-after-free parsing HTML5 stream - CVE-2018-18505: Privilege escalation through IPC channel messages - CVE-2016-5824: DoS (use-after-free) via a crafted ics file - CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 - CVE-2018-17466: Buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11 - CVE-2018-18492: Use-after-free with select element - CVE-2018-18493: Buffer overflow in accelerated 2D canvas with Skia - CVE-2018-18494: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs - CVE-2018-18498: Integer overflow when calculating buffer sizes for images - CVE-2018-12405: Memory safety bugs fixed in Firefox 64, 60.4, and Thunderbird 60.4 Other bugs fixed and changes made : - FileLink provider WeTransfer to upload large attachments - Thunderbird now allows the addition of OpenSearch search engines from a local XML file using a minimal user inferface: [+] button to select a file an add, [-] to remove. - More search engines: Google and DuckDuckGo available by default in some locales - During account creation, Thunderbird will now detect servers using the Microsoft Exchange protocol. It will offer the installation of a 3rd party add-on (Owl) which supports that protocol. - Thunderbird now compatible with other WebExtension-based FileLink add-ons like the Dropbox add-on - New WebExtensions FileLink API to facilitate add-ons - Fix decoding problems for messages with less common charsets (cp932, cp936) - New messages in the drafts folder (and other special or virtual folders) will no longer be included in the new messages notification - Thunderbird 60 will migrate security databases (key3.db, cert8.db to key4.db, cert9.db). Thunderbird 60.3.2 and earlier contained a fault that potentially deleted saved passwords and private certificate keys for users using a master password. Version 60.3.3 will prevent the loss of data; affected users who have already upgraded to version 60.3.2 or earlier can restore the deleted key3.db file from backup to complete the migration. - Address book search and auto-complete slowness introduced in Thunderbird 60.3.2 - Plain text markup with * for bold, / for italics, _ for underline and | for code did not work when the enclosed text contained non-ASCII characters - While composing a message, a link not removed when link location was removed in the link properties panel - Encoding problems when exporting address books or messages using the system charset. Messages are now always exported using the UTF-8 encoding - If the 'Date' header of a message was invalid, Jan 1970 or Dec 1969 was displayed. Now using date from 'Received' header instead. - Body search/filtering didn't reliably ignore content of tags - Inappropriate warning 'Thunderbird prevented the site (addons.thunderbird.net) from asking you to install software on your computer' when installing add-ons - Incorrect display of correspondents column since own email address was not always detected - Spurious (encoded newline) inserted into drafts and sent email - Double-clicking on a word in the Write window sometimes launched the Advanced Property Editor or Link Properties dialog - Fixe Cookie removal - 'Download rest of message' was not working if global inbox was used - Fix Encoding problems for users (especially in Poland) when a file was sent via a folder using 'Sent to > Mail recipient' due to a problem in the Thunderbird MAPI interface - According to RFC 4616 and RFC 5721, passwords containing non-ASCII characters are encoded using UTF-8 which can lead to problems with non-compliant providers, for example office365.com. The SMTP LOGIN and POP3 USER/PASS authentication methods are now using a Latin-1 encoding again to work around this issue - Fix shutdown crash/hang after entering an empty IMAP password
    last seen 2019-02-21
    modified 2019-02-15
    plugin id 122224
    published 2019-02-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122224
    title openSUSE Security Update : MozillaThunderbird (openSUSE-2019-182)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2019-0269.NASL
    description An update for thunderbird is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.5.0. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) * libical: Multiple use-after-free vulnerabilities (CVE-2016-5824) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121585
    published 2019-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121585
    title RHEL 6 : thunderbird (RHSA-2019:0269)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_B1F7D52FFC4248E8840387D4C9D26229.NASL
    description Mozilla Foundation reports : CVE-2018-18500: Use-after-free parsing HTML5 stream CVE-2018-18503: Memory corruption with Audio Buffer CVE-2018-18504: Memory corruption and out-of-bounds read of texture client buffer CVE-2018-18505: Privilege escalation through IPC channel messages CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied CVE-2018-18502: Memory safety bugs fixed in Firefox 65 CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121447
    published 2019-01-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121447
    title FreeBSD : mozilla -- multiple vulnerabilities (b1f7d52f-fc42-48e8-8403-87d4c9d26229)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3874-1.NASL
    description Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, gain additional privileges by escaping the sandbox, or execute arbitrary code. (CVE-2018-18500, CVE-2018-18501, CVE-2018-18502, CVE-2018-18503, CVE-2018-18504, CVE-2018-18505) It was discovered that Firefox allowed PAC files to specify that requests to localhost are sent through the proxy to another server. If proxy auto-detection is enabled, an attacker could potentially exploit this to conduct attacks on local services and tools. (CVE-2018-18506). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121507
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121507
    title Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 18.10 : firefox vulnerabilities (USN-3874-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4376.NASL
    description Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or privilege escalation.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121484
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121484
    title Debian DSA-4376-1 : firefox-esr - security update
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2019-0218.NASL
    description An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.5.0 ESR. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121501
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121501
    title RHEL 6 : firefox (RHSA-2019:0218)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2019-0219.NASL
    description An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.5.0 ESR. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121502
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121502
    title RHEL 7 : firefox (RHSA-2019:0219)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2019-0273-1.NASL
    description This update for MozillaFirefox, mozilla-nss fixes the following issues : Security issues fixed : CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (bsc#1122983). CVE-2018-18501: Fixed multiple memory safety bugs (bsc#1122983). CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (bsc#1122983). CVE-2018-12404: Cache side-channel variant of the Bleichenbacher attack (bsc#1119069). Non-security issue fixed: Update to MozillaFirefox ESR 60.5.0 Update to mozilla-nss 3.41.1 Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121638
    published 2019-02-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121638
    title SUSE SLED15 / SLES15 Security Update : MozillaFirefox (SUSE-SU-2019:0273-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-132.NASL
    description This update for MozillaFirefox to version 60.5.0esr fixes the following issues : Security issues fixed : - CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983). - CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983). - CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121590
    published 2019-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121590
    title openSUSE Security Update : MozillaFirefox (openSUSE-2019-132)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-133.NASL
    description This update for MozillaFirefox, mozilla-nss fixes the following issues: Security issues fixed : - CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983). - CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983). - CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983). Non-security issue fixed : - Update mozilla-nss to version 3.36.7 as build dependency.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121591
    published 2019-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121591
    title openSUSE Security Update : MozillaFirefox (openSUSE-2019-133)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2019-0218.NASL
    description From Red Hat Security Advisory 2019:0218 : An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.5.0 ESR. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121499
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121499
    title Oracle Linux 6 : firefox (ELSA-2019-0218)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2019-0219.NASL
    description From Red Hat Security Advisory 2019:0219 : An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Mozilla Firefox is an open source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.5.0 ESR. Security Fix(es) : * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed Davis as the original reporters.
    last seen 2019-02-21
    modified 2019-02-08
    plugin id 121500
    published 2019-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121500
    title Oracle Linux 7 : firefox (ELSA-2019-0219)
redhat via4
advisories
  • bugzilla
    id 1670633
    title CVE-2018-18505 Mozilla: Privilege escalation through IPC channel messages
    oval
    AND
    • comment firefox is earlier than 0:60.5.0-2.el6
      oval oval:com.redhat.rhsa:tst:20190218005
    • comment firefox is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20100861010
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    rhsa
    id RHSA-2019:0218
    released 2019-01-30
    severity Critical
    title RHSA-2019:0218: firefox security update (Critical)
  • bugzilla
    id 1670633
    title CVE-2018-18505 Mozilla: Privilege escalation through IPC channel messages
    oval
    AND
    • comment firefox is earlier than 0:60.5.0-2.el7
      oval oval:com.redhat.rhsa:tst:20190219005
    • comment firefox is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20100861010
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    rhsa
    id RHSA-2019:0219
    released 2019-01-30
    severity Critical
    title RHSA-2019:0219: firefox security update (Critical)
  • bugzilla
    id 1670633
    title CVE-2018-18505 Mozilla: Privilege escalation through IPC channel messages
    oval
    AND
    • comment thunderbird is earlier than 0:60.5.0-1.el6_10
      oval oval:com.redhat.rhsa:tst:20190269005
    • comment thunderbird is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20100896006
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    rhsa
    id RHSA-2019:0269
    released 2019-02-04
    severity Important
    title RHSA-2019:0269: thunderbird security update (Important)
  • bugzilla
    id 1670633
    title CVE-2018-18505 Mozilla: Privilege escalation through IPC channel messages
    oval
    AND
    • comment thunderbird is earlier than 0:60.5.0-1.el7_6
      oval oval:com.redhat.rhsa:tst:20190270005
    • comment thunderbird is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20100896006
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    rhsa
    id RHSA-2019:0270
    released 2019-02-04
    severity Important
    title RHSA-2019:0270: thunderbird security update (Important)
rpms
  • firefox-0:60.5.0-2.el6
  • firefox-0:60.5.0-2.el7
  • thunderbird-0:60.5.0-1.el6_10
  • thunderbird-0:60.5.0-1.el7_6
refmap via4
bid 106781
confirm
debian
  • DSA-4376
  • DSA-4392
gentoo
  • GLSA-201903-04
  • GLSA-201904-07
mlist
  • [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
  • [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
ubuntu
  • USN-3874-1
  • USN-3897-1
Last major update 05-02-2019 - 16:29
Published 05-02-2019 - 16:29
Last modified 02-04-2019 - 03:29
Back to Top