cve-2013-1737
Vulnerability from cvelistv5
Published
2013-09-18 10:00
Modified
2024-08-06 15:13
Severity ?
Summary
Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
References
security@mozilla.orghttp://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html
security@mozilla.orghttp://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html
security@mozilla.orghttp://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html
security@mozilla.orghttp://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html
security@mozilla.orghttp://rhn.redhat.com/errata/RHSA-2013-1268.html
security@mozilla.orghttp://rhn.redhat.com/errata/RHSA-2013-1269.html
security@mozilla.orghttp://www.debian.org/security/2013/dsa-2762
security@mozilla.orghttp://www.mozilla.org/security/announce/2013/mfsa2013-91.htmlVendor Advisory
security@mozilla.orghttp://www.securityfocus.com/bid/62475
security@mozilla.orghttp://www.ubuntu.com/usn/USN-1951-1
security@mozilla.orghttp://www.ubuntu.com/usn/USN-1952-1
security@mozilla.orghttps://bugzilla.mozilla.org/show_bug.cgi?id=907727
security@mozilla.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18789
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1268.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1269.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2762
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/security/announce/2013/mfsa2013-91.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/62475
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1951-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1952-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.mozilla.org/show_bug.cgi?id=907727
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18789
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:13:32.377Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2013:1491",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html"
          },
          {
            "name": "FEDORA-2013-16992",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html"
          },
          {
            "name": "openSUSE-SU-2013:1496",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html"
          },
          {
            "name": "FEDORA-2013-17074",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html"
          },
          {
            "name": "USN-1952-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1952-1"
          },
          {
            "name": "USN-1951-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1951-1"
          },
          {
            "name": "openSUSE-SU-2013:1633",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html"
          },
          {
            "name": "oval:org.mitre.oval:def:18789",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18789"
          },
          {
            "name": "FEDORA-2013-17047",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html"
          },
          {
            "name": "openSUSE-SU-2013:1493",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html"
          },
          {
            "name": "62475",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/62475"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=907727"
          },
          {
            "name": "openSUSE-SU-2013:1499",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-91.html"
          },
          {
            "name": "RHSA-2013:1268",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1268.html"
          },
          {
            "name": "RHSA-2013:1269",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1269.html"
          },
          {
            "name": "DSA-2762",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2762"
          },
          {
            "name": "openSUSE-SU-2013:1495",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-09-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the \"this\" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "name": "openSUSE-SU-2013:1491",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html"
        },
        {
          "name": "FEDORA-2013-16992",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html"
        },
        {
          "name": "openSUSE-SU-2013:1496",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html"
        },
        {
          "name": "FEDORA-2013-17074",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html"
        },
        {
          "name": "USN-1952-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1952-1"
        },
        {
          "name": "USN-1951-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1951-1"
        },
        {
          "name": "openSUSE-SU-2013:1633",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html"
        },
        {
          "name": "oval:org.mitre.oval:def:18789",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18789"
        },
        {
          "name": "FEDORA-2013-17047",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html"
        },
        {
          "name": "openSUSE-SU-2013:1493",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html"
        },
        {
          "name": "62475",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/62475"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=907727"
        },
        {
          "name": "openSUSE-SU-2013:1499",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-91.html"
        },
        {
          "name": "RHSA-2013:1268",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1268.html"
        },
        {
          "name": "RHSA-2013:1269",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1269.html"
        },
        {
          "name": "DSA-2762",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2762"
        },
        {
          "name": "openSUSE-SU-2013:1495",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@mozilla.org",
          "ID": "CVE-2013-1737",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the \"this\" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2013:1491",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html"
            },
            {
              "name": "FEDORA-2013-16992",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html"
            },
            {
              "name": "openSUSE-SU-2013:1496",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html"
            },
            {
              "name": "FEDORA-2013-17074",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html"
            },
            {
              "name": "USN-1952-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1952-1"
            },
            {
              "name": "USN-1951-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1951-1"
            },
            {
              "name": "openSUSE-SU-2013:1633",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html"
            },
            {
              "name": "oval:org.mitre.oval:def:18789",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18789"
            },
            {
              "name": "FEDORA-2013-17047",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html"
            },
            {
              "name": "openSUSE-SU-2013:1493",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html"
            },
            {
              "name": "62475",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/62475"
            },
            {
              "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=907727",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=907727"
            },
            {
              "name": "openSUSE-SU-2013:1499",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html"
            },
            {
              "name": "http://www.mozilla.org/security/announce/2013/mfsa2013-91.html",
              "refsource": "CONFIRM",
              "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-91.html"
            },
            {
              "name": "RHSA-2013:1268",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1268.html"
            },
            {
              "name": "RHSA-2013:1269",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1269.html"
            },
            {
              "name": "DSA-2762",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2762"
            },
            {
              "name": "openSUSE-SU-2013:1495",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2013-1737",
    "datePublished": "2013-09-18T10:00:00",
    "dateReserved": "2013-02-13T00:00:00",
    "dateUpdated": "2024-08-06T15:13:32.377Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-1737\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2013-09-18T10:08:24.740\",\"lastModified\":\"2024-11-21T01:50:17.443\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the \\\"this\\\" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.\"},{\"lang\":\"es\",\"value\":\"Mozilla Firefox (anteriores a 24.0), Firefox ESR 17.x (anteriores a 17.0.9), Thunderbird (anteriores a 24.0), Thunderbird ESR 17.x (anteriores a 17.0.9) y SeaMonkey (anteriores a 2.21) no identifican apropiadamente el objeto \\\"this\\\" en proxies DOM durante el uso de m\u00e9todos \\\"getter\\\" definidos por el usuario, lo que podr\u00eda permitir a un atacante remoto evitar las restricciones de acceso a trav\u00e9s de vectores que hacen uso del objeto \\\"expando\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"341D94CE-C0EB-47FA-A043-E7B0F4344BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C3EE07-F201-451A-89A1-A41B8B2165E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45837B42-7D29-4475-94F1-E29CD5831C7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7028A433-7D1B-4C6F-A0F6-1B69682F7853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86C07513-8F98-4FA6-837D-7D735AE5EA91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1D87C70-0EC2-49DE-A59D-CAF22760BC9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61AE2EAA-55A4-4FC9-BC3F-0FEE5BB2DE99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCC56C1D-6F46-4B08-B085-E9E0D41DB8CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird_esr:17.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4856EC21-B574-4F7E-8070-04A8273546CE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"1B9D6469-EC21-4DE3-87F9-693521823C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58EB8E8A-84DE-43AA-B8F0-B585FB73D724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C19C0BF7-390D-4E2E-BA32-28DFF73C55F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE5E50C-80ED-4CA7-BC85-8BD2E324D527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBF912C-A12E-4DBD-84AC-8B440E190BCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8EDED6-29EF-4A9F-955D-F5E6611C2141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC9C82D-586A-48F4-B540-1E2AE79806B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"51FCF83B-630A-4413-BFAA-0C24A6B8F4F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"84B2AA0A-0220-49DD-82CD-37FDC563F146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D754AF10-1E43-46C8-A444-E7DB3401509D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34182167-F1DF-455B-BFDB-0A8491590479\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8ECA6CE-20D0-4A4F-B376-888A9328B044\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FEFCAB0-E57A-46E8-94C7-8510BB87C6B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB5C972-AF7B-4EC7-BCE5-867CACCF5C19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C68DBB31-7804-446E-9A53-073E4B74E851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31ADCC51-CE05-4EB6-BE8F-B64FD62946A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387390AE-CF25-47ED-BD36-F42455DE1A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D5F0AD-9974-40A1-942F-0F03A278DAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C388E6F-148E-4EA5-8D82-7778398122BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F1FEB21-60B1-4303-BE19-576CC93B940C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37F07875-FB5E-4B13-9798-BF9AEBD8A2A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87FD9961-DA1C-4846-A779-A836C07B98A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A40438F-0CF1-4A3E-BAC7-199D72901B53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EB46CA-D5DD-4FA8-A234-21C938620F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"635FCE4C-2D15-4FB2-8917-D176B1539024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E59E74C2-38F2-4B7F-88C0-9919548713B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6663ED-4643-4BB7-B281-706C7A0E10F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E8003B-C319-4AD0-9D32-DA05346869C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E60060B4-2301-497E-B03B-3DF3FBF159AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4983E235-19E8-4315-977B-E74CD0BD5F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0D4ECE-209E-4919-B31C-D8BCCEABC759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02ED302-0410-4F21-99C5-613DF719E7E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F56E95-F0FE-4E47-9C01-4D8E4976B773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDAE360-E3B8-4BA0-A036-2FCFFEF5D498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E86983D-1903-4792-9F54-1B0B05A944A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"681C9B76-4D67-42B3-9270-5AD6CBD152A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"247FEB6D-34CE-49E8-9B22-D030F0C26DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF54558B-D33F-453E-BCAA-7E47A91C3CE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"01459193-203D-4E26-8741-EF6EDC38A88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"240DF7DC-D927-49D7-A8D2-38E6F9D1C844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CC53990-A6DE-4549-926F-BB5346FE2A6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5186C595-0FE6-4F25-B9A6-2CDD743A3357\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F630985-334F-4644-965F-DA8BEEE2449D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A6519DF-E299-422B-B891-494AE8240ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD3A962-E6A6-4681-BD6E-047ABF8CB776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ABE95E2-BA65-4E55-A869-875A408A37F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A4D8392-FC84-4963-B505-676B629992BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5771130B-203B-46A1-A3C9-98BBA17C3654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC8BB2F-487D-40D7-83FD-1CDD373014CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC43A7E2-20B1-4CBE-815C-BC8A89D5B496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCCCCD0-CB6C-4A82-98F7-017E4F850BE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"884E19F8-0AB3-427F-BDEC-1CDC420D1231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBBBA80F-4CD4-4419-905A-B90AC3F961F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D62B7671-43FC-4D1B-B69D-5D5E2EC205E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A1E095-5FC4-42B4-998C-F28B3E8D7DC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8725924E-A1D8-42F6-8577-774056A6EC19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC3E936-6BB0-4CBD-A37C-66E4AF62B813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"026603CE-0A59-4668-92F8-0306FCE31B64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D76D908D-1148-4A65-B9F4-E18B1B01165A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA22ED4-5C46-403C-889F-82A52DA1EBB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EC30286-5862-4D56-BE7D-44EDCC2BA37B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ED26A20-4DF7-43B4-81EF-6C77A57A85B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"05DA7741-6ED9-4A0C-B2EB-921B01D8F60A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C343FE1B-1A54-410C-8FE4-110C089529E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"836520C2-C59C-4E37-BBE1-7FA7C5CAA690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D055E64F-7CEE-4501-B233-CBC0D5CB6ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"27A7DC95-1678-405E-B336-32828BAFC3F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6289FA43-9A90-41AE-8C0A-C49017B1FC3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E3AF9B-96E1-4875-8F9F-F17289B17D82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E98FD1D-58F0-4832-8BD9-D6561AC4903E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D92E1E-D0E4-41A0-9126-417FBAE62E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCCA8B5-5E59-41C2-87C1-0F4A72E9812A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"040AFFC7-ED14-49A1-8995-806479C183F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA38731-42C7-4B6E-A09B-5B73814190A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F74CB55-8FA5-4FBC-B37E-69F035282360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE3356A-EFD5-4651-8FF7-0F79570D3670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE8DA73-2FEC-4F2B-9264-6DFB663F0950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF84523-CBF7-4F1D-9818-9DAFED30851D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C344C3-093D-486E-B2BA-47E890FC159B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D8ED22-2F5A-408E-995F-D6B046250EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7744088-C55D-4006-8A1C-545DF9687A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B888F4F3-F5C1-47CB-85EA-BF088B3629FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2FD7275-C402-4A9D-9A16-C2B0FB7A73E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7DFFC99-7534-4B22-87CA-AA8DB1B8123D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE3FE289-6975-4248-881E-12D850B50077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3AA9040-15C9-41C1-AF4B-3162C7550073\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4FDE74E-5550-4813-B075-336739C3951D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"39361B4B-0025-4406-8BB7-DACBB3B328DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E78246D-2C7D-46E8-AADE-E52AA03B17B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9BAB391-BE12-453B-BF4E-4C3957B3BC37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8860F4-4F1A-455D-AD76-53EFF54A7F81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABDBCDB-6495-49B8-9F76-A1BB9B4E557E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4855BEDC-F221-45EB-9F85-E0FA083B334E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"802D0724-B777-479E-BAB0-16C8FA6BFD08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119C243B-4508-4D1E-8B86-C65EB4E6C1EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D6E1F0-D019-4B5B-9137-D0AE80F4E74F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BEE084-0B38-41AF-A836-5C469C1CB7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3C9A8AA-BB73-4252-995F-AE183639D949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0200DF6D-B067-49DE-BC6A-B1A5EE860454\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B64472A-A123-4FF8-A39B-C00F5055C4B5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3283FBAC-B77A-4C62-9D51-70BB35FA3D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10B8803-C319-4AAA-81CF-FA206A33BA55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B5567C-8969-456D-B6DF-3562B99C41FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5657779C-19F9-42B8-BBBD-292B898E8FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEA3B9F4-BD8E-488B-A362-0B86BC6DA275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A91BD4A-76BD-40B9-9E12-22CACAAE42BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1890BA0-0BCD-4B24-805A-7580884CE5B3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"17.0.9\",\"matchCriteriaId\":\"6C870298-91C3-4D0B-B420-4B0E27AB2254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2FD78A8-0D3A-412C-8776-20C598697564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"777D8DC5-8D43-4842-B0A7-3C933F41F6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808C66D2-4C53-4544-AD21-443D9A400B84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB95E8B-CF01-471F-8306-BB9FB0896904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7E092E-BCBE-48B4-8F6A-D3E4A0369AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1D90B0-9E81-4828-8122-A66FB0953863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3920CE-A546-4E95-9E00-46DE4C732F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1484B00-53D2-4C1C-9478-DDAA9A35CEB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:17.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE2BF75-4343-431F-8F73-16E2E1AA3F89\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"23.0.1\",\"matchCriteriaId\":\"910875D7-66BB-4F79-A058-EC05B1D1E6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FF9DFE-491D-4260-8A49-07FD342B9412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE09D089-7F48-466B-B03A-C64152A12615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"653D73DA-21C0-4C3F-9269-5A6D5C5B1E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"804A0ACE-EB28-413D-93F4-E849FEA01390\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA49C6F-9115-41A5-BBDE-743CB9DEDDA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC8D9A8-D4DB-4BC9-89CE-F3AF742C399F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF6A02E-A85B-48BA-A60C-E92CDA3A8055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:23.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50127B73-3517-4E82-94E9-FC5AA0DA3357\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1268.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1269.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2762\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.mozilla.org/security/announce/2013/mfsa2013-91.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/62475\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1951-1\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1952-1\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=907727\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18789\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115907.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116610.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117526.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1268.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1269.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2013/mfsa2013-91.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/62475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1951-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1952-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=907727\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18789\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.