Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-3647 (GCVE-0-2011-3647)
Vulnerability from cvelistv5 – Published: 2011-11-09 11:00 – Updated: 2024-08-06 23:37- n/a
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:37:48.659Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880"
},
{
"name": "RHSA-2011:1439",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"name": "SUSE-SU-2011:1256",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
},
{
"name": "oval:org.mitre.oval:def:13550",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-11-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880"
},
{
"name": "RHSA-2011:1439",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"name": "SUSE-SU-2011:1256",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
},
{
"name": "oval:org.mitre.oval:def:13550",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3647",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880"
},
{
"name": "RHSA-2011:1439",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
},
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"name": "SUSE-SU-2011:1256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
},
{
"name": "oval:org.mitre.oval:def:13550",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-3647",
"datePublished": "2011-11-09T11:00:00",
"dateReserved": "2011-09-23T00:00:00",
"dateUpdated": "2024-08-06T23:37:48.659Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.6.23\", \"matchCriteriaId\": \"9915D7D8-64F6-448C-A128-63D0352312CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C7AA88B-638A-451A-B235-A1A1444BE417\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C01AD7C-8470-47AB-B8AE-670E3A381E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E43F2F1-9252-4B44-8A61-D05305915A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BB9D48B-DC7B-4D92-BB26-B6DE629A2506\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A360D595-A829-4DDE-932E-9995626917E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E9B5349-FAA7-4CDA-9533-1AD1ACDFAC4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07243837-C353-4C25-A5B1-4DA32807E97D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B832C034-F793-415F-BFC8-D97A18BA6BC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83CD1A13-66CB-49CC-BD84-5D8334DB774A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93C142C5-3A85-432B-80D6-2E7B1B4694F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2434FCE7-A50B-4527-9970-C7224B31141C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*\", \"matchCriteriaId\": \"5633FB6E-D623-49D4-9858-4E20E64DE458\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"429ECA02-DBCD-45FB-942C-CA4BC1BC8A72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5F0DC80-5473-465C-9D7F-9589F1B78E12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"567FF916-7DE0-403C-8528-7931A43E0D18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"010B34F4-910E-4515-990B-8E72DF009578\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A545A77-2198-4685-A87F-E0F2DAECECF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*\", \"matchCriteriaId\": \"438AACF8-006F-4522-853F-30DBBABD8C15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"778FAE0C-A5CF-4B67-93A9-1A803E3E699F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7447185-7509-449D-8907-F30A42CF7EB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EDBAC37-9D08-44D1-B279-BC6ACF126CAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FFF89FA-2020-43CC-BACD-D66117B3DD26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"834BB391-5EB5-43A8-980A-D305EDAE6FA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A38AD88-BAA6-4FBE-885B-69E951BD1EFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B500EE6C-99DB-49A3-A1F1-AFFD7FE28068\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F2938F2-A801-45E5-8E06-BE03DE03C8A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F18A45C0-419C-4723-AB7D-5880EF668CE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABB88E86-6E83-4A59-9266-8B98AA91774D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"66BE50FE-EA21-4633-A181-CD35196DF06E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2F38886-C25A-4C6B-93E7-36461405BA99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C65D2670-F37F-48CB-804A-D35BB1C27D9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE8E5194-7B34-4802-BDA6-6A86EB5EDE05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2917BD67-CE81-4B94-B241-D4A9DDA60319\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A524A94E-F19B-42B9-AA8E-171751C339AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F71436CF-F756-44E0-8E69-6951F6B3E54A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"582EE839-B83F-4908-9780-D0C92DC44FD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"824369CF-00A0-434E-94BC-71CA1317012C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCB35099-B04E-4796-A25D-953329FE62F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C30ACBCA-4FA1-46DE-8F15-4830BC27E160\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9453EF65-7C69-449E-BF7C-4FECFB56713E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AA75825-21CF-475B-8040-126A13FA2216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA97C80E-17FA-4866-86CE-29886145ED80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DE24BED-202E-416D-B5F2-8207D97B9939\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04198E04-CE1D-4A5A-A20C-D1E135B45F94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"717DB967-F658-4699-A224-5B261BFEC10A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3487FA64-BE04-42CA-861E-3DAC097D7D32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D956DC-C73B-439F-8D79-8239207CC76F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E2C7E7-56C0-466C-BB08-5EB43922C4F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"462E135A-5616-46CC-A9C0-5A7A0526ACC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6121F9C1-F4DF-4AAB-9E51-AC1592AA5639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58D44634-A0B5-4F05-8983-B08D392EC742\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4105171B-9C90-4ABF-B220-A35E7BA9EE40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20985549-DB24-4B69-9D40-208A47AE658E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43A13026-416F-4308-8A1B-E989BD769E12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"612B015E-9F96-4CE6-83E4-23848FD609E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E391619-0967-43E1-8CBC-4D54F72A85C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0544D626-E269-4677-9B05-7DAB23BD103B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C95F7B2C-80FC-4DF2-9680-F74634DCE3E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863C140E-DC15-4A88-AB8A-8AEF9F4B8164\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38CD049A-5333-4FF7-AD34-6B74E19BADCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0066576D-D66A-4B59-B5C3-471EEBEE8B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60ED6DAA-9194-4829-BC1A-00F04BE7930A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13BEB9A6-EFD5-4793-9603-84DB84F1CF7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"461163C6-4CA8-4BA9-95A1-136E612CBA6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"275E9D96-1290-44AB-BF9B-E9E4A803F593\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"412DF091-7604-4110-87A0-3488116A97E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11E07FED-ABDB-4B0A-AB2E-4CBF1EAC4301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A6558F1-9E0D-4107-909A-8EF4BC8A9C2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63DF3D65-C992-44CF-89B4-893526C6242E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9024117-2E8B-4240-9E21-CC501F3879B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52624B41-AB34-40AD-8709-D9646B618AB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"917E9856-9556-4FD6-A834-858F8837A6B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98BBD74D-930C-4D80-A91B-0D61347BAA63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAF2E696-883D-4DE5-8B79-D8E5D9470253\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94E04FD9-38E8-462D-82C2-729F7F7F0465\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5888517E-3C57-4A0A-9895-EA4BCB0A0ED5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BB21291-B9F3-445E-A9E9-EA1822083DD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D595F649-ECBE-45E0-8AAD-BCBC65A654B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FE6E920-9A4C-431B-89EA-683A22F15ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18B6CC9F-6295-4598-B28B-0CA19D1D9F45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9F0434D-C84F-49FD-9F44-66D3ACD7B601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6AAB416-E865-4EEE-8FCB-A91253BEB52B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76CD3BDF-A079-4EF3-ABDE-43CBDD08DB1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"031E8624-5161-43AF-AF19-6BAB5A94FDD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54186D4A-C6F0-44AD-94FB-73B4346ABB6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47E50AD9-BA35-4817-BD4D-5D678FC5A3C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD09DE40-8C9B-41EA-B372-9E4E4830E8F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F223FB83-0EDB-4429-94B9-1AEEF314B73F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC6B977F-292F-4981-95A0-6065A3C487D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"342226B9-2C0C-416C-81FE-19C49F03AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A6A28E0-F67A-4275-B0D9-A02822E9EF7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECAB4696-76F3-458C-B33B-D7F8690C60A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBB444FD-15F3-4447-9EA8-1669779A5749\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F92E2EF3-A612-476F-9D31-1EEC240C7EA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F175D30-2416-4172-BF11-DA78D252D608\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DD3F168-3EF4-492E-BBAA-EACB1357C709\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B46BA97-2860-45E4-9FD3-F418A202E4F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1C23289-38C3-4C62-8B27-249EAECC297E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3782354-7EB7-49D2-B240-1871F6CB84C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D47263-03AD-4060-91E3-90F997B3D174\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD775DF-277E-4D5B-B980-B8E6E782467D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8587BFD-417D-42BE-A5F8-22FDC68FA9E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7364FAB-EEE9-4064-A8AD-6547239F9AB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C50485F-BC7B-4B70-A47B-1712E2DBAC5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EE386B-0833-484E-A2AB-86B4470D4D45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3EF1B4D-6556-4B3C-BDD0-6348A4D4A91D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68C5C7CF-005B-42FC-B950-90303F0CC115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B2FA2CF-7FE4-43B1-96A0-C14666EDBD7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30290F6D-55CA-47EB-8F41-7BBB745C7A34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F61F0607-14B0-49AD-B7E6-C4D75401C270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FED863D-2898-4148-A9FB-73BFF9DE4396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"779C1245-A6F9-41F5-B8D4-FAE506A23FD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E7CFEE9-70D4-465F-9FB9-397E6B200FA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"197E56BF-BE78-459F-A124-786DF39D1235\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07747612-3890-4271-94A4-4347E5ED073D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0855BA85-BC52-4EDF-915A-8B4E5FB48092\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC273819-9DDE-4591-9376-1DD5782461F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B68D1E7-B2F7-4581-8173-8CCF55A0E1BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDFF6453-B707-4772-8CDF-2F8922FD4894\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.1.5\", \"matchCriteriaId\": \"51FE9002-8ED0-4BA0-9181-1739A535A3AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0618BD26-0EF5-4774-9131-B5ABD4CD302A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D604DAE-DF63-413C-9F49-FFC8E84699F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11DE6185-09F4-48E3-9742-F9D8030B5774\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2E70864-E077-4CD6-A0E8-BC2C4C298A6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61E565E5-286D-4A68-B085-5659DFE59A9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2A68B4-9101-4AC5-9E82-EEB5A5405541\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDA6C390-9BA7-4355-8C0A-CD68FF6AC236\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C75B125-E5BB-49A0-B12D-6CF40D8A5DB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70DDB53E-7A12-4A08-8999-DB68E6DF901E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6514EDE8-7C78-4C72-A313-E0915D89E4EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5263F879-9B90-4582-B677-F133DEBE5259\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C256B73C-9ABC-43D4-8C57-09161BC9F923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"055D1044-9FC5-45AA-8407-649E96C5AFE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C1C87A5-C14D-4A23-B865-3BB1FCDC8470\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C4DB0BB-BFD7-4E7A-B3EF-9C5422602216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0D56153-E20A-46D8-859E-A51E5C03D674\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C51A6F4-F88F-4BF2-BF71-5DC48559C085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFC390CB-774C-47BE-95C3-059943A9E645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"379F6A73-B45F-4094-8167-4E929FFB1749\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B71DE7AC-553B-4524-8B33-5605518449EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72B02389-0DCD-45BC-A09F-CB6B75940616\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41AE4644-2D23-43EA-ABDA-7BE60EFD1EFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FB87608-0DF8-4729-95C5-CFA386AB3AC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A406214-29E5-4E13-B2E1-1CF72F1E60BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6C169DA-26BC-42EE-817B-2F0685069495\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C99BAF7-B48E-4402-B2BF-EB07235E402E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3F0C73F-291F-4A92-87B8-2269B5C1516D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C86FD617-E4FE-4F85-AAA4-4F968A9DEC9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"938B1260-74A7-4CFF-8086-415DCC284430\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E28672BA-E3C2-40C3-80E1-95B7CDD089E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9308147C-0A23-48BC-BFA9-A49B9D73014E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6654EC3-BED6-4D6D-9B7F-DF4CC8E464BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CAD8DCC-DBB4-40EE-927C-7B0969700077\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77F9CE47-E3AA-49D7-AEC9-447951AC31E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"581615BB-C781-42CA-836E-0E0EAB8C4504\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"257F43FA-D22C-4BF0-A02E-261A54142BCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C8D63F5-78D5-4F7B-B15A-2C15FC405E27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84BC6D68-4ED4-43CF-A2EB-47BD15D11AE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D291234-D64A-4E8A-A7CD-08BB980E1CD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB1FC6D1-8D93-4D87-9D73-7C6C0F8D45C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A3C27EC-5794-49C1-96E0-997E700B13DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97BDCEEC-25FE-4763-AC63-BA6B4F25E0C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFC60781-766B-4B9C-B68D-45D51C5E5D20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"745C2CBA-4824-441B-A6BC-E80959C2E035\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C6A7D00-A203-4891-96CE-20C91FCBF048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A8CB480-0595-4BC1-998E-3638E85DB367\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC7EAB8D-CA40-4C29-99DF-24FF1753BCF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C9218A9-DA27-436A-AC93-F465FC14ECF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E66503D7-72CB-42A5-8C85-D9579EF2C0A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CD7D204-3EBA-4D9E-B95A-86524B4C03D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBBF526-7A28-436B-9B01-EADE913602B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B373B409-0939-4707-99F1-95B121BFF7FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75A0BCE3-38E7-4318-9A7E-3D895171129A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E80CA1DE-B920-4E28-BEFC-574148D19A0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2303104C-4A91-4704-A9CB-8C83A859090E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DCDAA51-4AA3-4EC4-B441-71FB3C3304F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04CA7AD2-79BA-4A73-ADAB-E3BCA3FD7F73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D54ACD07-FAB7-4513-A707-18FAF7D565C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7260CE1F-501D-44FF-A3FA-2137CA01733B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55D3DD1B-64DF-46C8-80A3-99D2E34B665F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DF479C3-95A0-414F-B47B-C94BE95713D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48702EEB-C272-46ED-9C61-6F44D6964DDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC650D89-CEEC-4A90-B3B9-5F0ADCEFCBB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C8C0115-94B1-4046-A599-E92DCFB936F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4033E532-7298-40DF-A582-22B7106035C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE19E377-CB55-4784-A003-5335D531AAF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BF605F6-2A84-4DE5-AB62-282E9C46479B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08F10B5E-0780-4756-919C-B0C00C673412\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D930F0F-DCC3-4905-A4B1-288F0CCC6975\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBA0F9D4-B68A-4018-BC4E-95B87A1A8489\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61CCB291-B71B-40D3-8493-215003851BDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD1FE7A-B888-461D-93F3-B71C94B4AA56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2727C9C-618D-4AEF-B7BE-8BE5935483F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95B21CE4-AF78-4D1B-A73E-84E83DB4A2C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48F3528F-4E43-4D91-957E-49C7DB2A135A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E7706B2-D0F0-4E37-B9B5-8DA72413382B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BEE78E5-D163-4764-B3BB-5BE270549F5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58FC2EFB-CE85-4A65-A7B4-A0779F11B5BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B9EA91-A461-42CE-9ED7-3805BD13A4B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C48E432-8945-4918-B2A4-AD2E05A51633\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A95B301-A72B-4F95-A7D6-4B574E9D3BDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"968C261F-A7D5-4EB6-BCFF-EE40DB5A11D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2A115A0-D887-491D-99F6-8D5B47771760\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AB4C2C3-A535-4B87-90DC-44549555A452\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.\"}, {\"lang\": \"es\", \"value\": \"El \u0027JSSubScriptLoader\u0027 en Mozilla Firefox antes de v3.6.24 y Thunderbird antes de v3.1.6 no maneja adecuadamente \u0027XPCNativeWrappers\u0027 durante las llamadas al m\\u00e9todo loadSubScript en un complemento, lo que permite ganar privilegios a los atacantes remotos a trav\\u00e9s de un sitio web espec\\u00edficamente dise\\u00f1ado que aprovecha cierto el comportamiento de \u0027unwrapping\u0027. Se trata de un problema relacionado con CVE-2011-3004.\"}]",
"id": "CVE-2011-3647",
"lastModified": "2024-11-21T01:30:54.777",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2011-11-09T11:55:03.520",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mozilla.org/security/announce/2011/mfsa2011-46.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1439.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=680880\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mozilla.org/security/announce/2011/mfsa2011-46.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1439.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=680880\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-3647\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-11-09T11:55:03.520\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.\"},{\"lang\":\"es\",\"value\":\"El \u0027JSSubScriptLoader\u0027 en Mozilla Firefox antes de v3.6.24 y Thunderbird antes de v3.1.6 no maneja adecuadamente \u0027XPCNativeWrappers\u0027 durante las llamadas al m\u00e9todo loadSubScript en un complemento, lo que permite ganar privilegios a los atacantes remotos a trav\u00e9s de un sitio web espec\u00edficamente dise\u00f1ado que aprovecha cierto el comportamiento de \u0027unwrapping\u0027. Se trata de un problema relacionado con CVE-2011-3004.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.23\",\"matchCriteriaId\":\"9915D7D8-64F6-448C-A128-63D0352312CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7AA88B-638A-451A-B235-A1A1444BE417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C01AD7C-8470-47AB-B8AE-670E3A381E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E43F2F1-9252-4B44-8A61-D05305915A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB9D48B-DC7B-4D92-BB26-B6DE629A2506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A360D595-A829-4DDE-932E-9995626917E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E9B5349-FAA7-4CDA-9533-1AD1ACDFAC4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07243837-C353-4C25-A5B1-4DA32807E97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B832C034-F793-415F-BFC8-D97A18BA6BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83CD1A13-66CB-49CC-BD84-5D8334DB774A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C142C5-3A85-432B-80D6-2E7B1B4694F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2434FCE7-A50B-4527-9970-C7224B31141C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*\",\"matchCriteriaId\":\"5633FB6E-D623-49D4-9858-4E20E64DE458\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429ECA02-DBCD-45FB-942C-CA4BC1BC8A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F0DC80-5473-465C-9D7F-9589F1B78E12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567FF916-7DE0-403C-8528-7931A43E0D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"010B34F4-910E-4515-990B-8E72DF009578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A545A77-2198-4685-A87F-E0F2DAECECF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*\",\"matchCriteriaId\":\"438AACF8-006F-4522-853F-30DBBABD8C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778FAE0C-A5CF-4B67-93A9-1A803E3E699F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7447185-7509-449D-8907-F30A42CF7EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDBAC37-9D08-44D1-B279-BC6ACF126CAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFF89FA-2020-43CC-BACD-D66117B3DD26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"834BB391-5EB5-43A8-980A-D305EDAE6FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A38AD88-BAA6-4FBE-885B-69E951BD1EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B500EE6C-99DB-49A3-A1F1-AFFD7FE28068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2938F2-A801-45E5-8E06-BE03DE03C8A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F18A45C0-419C-4723-AB7D-5880EF668CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB88E86-6E83-4A59-9266-8B98AA91774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BE50FE-EA21-4633-A181-CD35196DF06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F38886-C25A-4C6B-93E7-36461405BA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C65D2670-F37F-48CB-804A-D35BB1C27D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8E5194-7B34-4802-BDA6-6A86EB5EDE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2917BD67-CE81-4B94-B241-D4A9DDA60319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A524A94E-F19B-42B9-AA8E-171751C339AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71436CF-F756-44E0-8E69-6951F6B3E54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"582EE839-B83F-4908-9780-D0C92DC44FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824369CF-00A0-434E-94BC-71CA1317012C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB35099-B04E-4796-A25D-953329FE62F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C30ACBCA-4FA1-46DE-8F15-4830BC27E160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9453EF65-7C69-449E-BF7C-4FECFB56713E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA75825-21CF-475B-8040-126A13FA2216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA97C80E-17FA-4866-86CE-29886145ED80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE24BED-202E-416D-B5F2-8207D97B9939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04198E04-CE1D-4A5A-A20C-D1E135B45F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717DB967-F658-4699-A224-5B261BFEC10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3487FA64-BE04-42CA-861E-3DAC097D7D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D956DC-C73B-439F-8D79-8239207CC76F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E2C7E7-56C0-466C-BB08-5EB43922C4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"462E135A-5616-46CC-A9C0-5A7A0526ACC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6121F9C1-F4DF-4AAB-9E51-AC1592AA5639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58D44634-A0B5-4F05-8983-B08D392EC742\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4105171B-9C90-4ABF-B220-A35E7BA9EE40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20985549-DB24-4B69-9D40-208A47AE658E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A13026-416F-4308-8A1B-E989BD769E12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"612B015E-9F96-4CE6-83E4-23848FD609E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E391619-0967-43E1-8CBC-4D54F72A85C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0544D626-E269-4677-9B05-7DAB23BD103B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C95F7B2C-80FC-4DF2-9680-F74634DCE3E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863C140E-DC15-4A88-AB8A-8AEF9F4B8164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38CD049A-5333-4FF7-AD34-6B74E19BADCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0066576D-D66A-4B59-B5C3-471EEBEE8B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60ED6DAA-9194-4829-BC1A-00F04BE7930A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13BEB9A6-EFD5-4793-9603-84DB84F1CF7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461163C6-4CA8-4BA9-95A1-136E612CBA6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"275E9D96-1290-44AB-BF9B-E9E4A803F593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"412DF091-7604-4110-87A0-3488116A97E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E07FED-ABDB-4B0A-AB2E-4CBF1EAC4301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6558F1-9E0D-4107-909A-8EF4BC8A9C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63DF3D65-C992-44CF-89B4-893526C6242E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9024117-2E8B-4240-9E21-CC501F3879B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52624B41-AB34-40AD-8709-D9646B618AB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"917E9856-9556-4FD6-A834-858F8837A6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98BBD74D-930C-4D80-A91B-0D61347BAA63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF2E696-883D-4DE5-8B79-D8E5D9470253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E04FD9-38E8-462D-82C2-729F7F7F0465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5888517E-3C57-4A0A-9895-EA4BCB0A0ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB21291-B9F3-445E-A9E9-EA1822083DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D595F649-ECBE-45E0-8AAD-BCBC65A654B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FE6E920-9A4C-431B-89EA-683A22F15ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B6CC9F-6295-4598-B28B-0CA19D1D9F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F0434D-C84F-49FD-9F44-66D3ACD7B601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6AAB416-E865-4EEE-8FCB-A91253BEB52B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76CD3BDF-A079-4EF3-ABDE-43CBDD08DB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031E8624-5161-43AF-AF19-6BAB5A94FDD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54186D4A-C6F0-44AD-94FB-73B4346ABB6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E50AD9-BA35-4817-BD4D-5D678FC5A3C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD09DE40-8C9B-41EA-B372-9E4E4830E8F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F223FB83-0EDB-4429-94B9-1AEEF314B73F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC6B977F-292F-4981-95A0-6065A3C487D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342226B9-2C0C-416C-81FE-19C49F03AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6A28E0-F67A-4275-B0D9-A02822E9EF7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECAB4696-76F3-458C-B33B-D7F8690C60A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB444FD-15F3-4447-9EA8-1669779A5749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F92E2EF3-A612-476F-9D31-1EEC240C7EA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F175D30-2416-4172-BF11-DA78D252D608\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD3F168-3EF4-492E-BBAA-EACB1357C709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B46BA97-2860-45E4-9FD3-F418A202E4F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C23289-38C3-4C62-8B27-249EAECC297E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3782354-7EB7-49D2-B240-1871F6CB84C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D47263-03AD-4060-91E3-90F997B3D174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD775DF-277E-4D5B-B980-B8E6E782467D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8587BFD-417D-42BE-A5F8-22FDC68FA9E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7364FAB-EEE9-4064-A8AD-6547239F9AB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C50485F-BC7B-4B70-A47B-1712E2DBAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EE386B-0833-484E-A2AB-86B4470D4D45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3EF1B4D-6556-4B3C-BDD0-6348A4D4A91D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C5C7CF-005B-42FC-B950-90303F0CC115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B2FA2CF-7FE4-43B1-96A0-C14666EDBD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30290F6D-55CA-47EB-8F41-7BBB745C7A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F61F0607-14B0-49AD-B7E6-C4D75401C270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FED863D-2898-4148-A9FB-73BFF9DE4396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"779C1245-A6F9-41F5-B8D4-FAE506A23FD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E7CFEE9-70D4-465F-9FB9-397E6B200FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"197E56BF-BE78-459F-A124-786DF39D1235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07747612-3890-4271-94A4-4347E5ED073D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0855BA85-BC52-4EDF-915A-8B4E5FB48092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC273819-9DDE-4591-9376-1DD5782461F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B68D1E7-B2F7-4581-8173-8CCF55A0E1BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDFF6453-B707-4772-8CDF-2F8922FD4894\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.5\",\"matchCriteriaId\":\"51FE9002-8ED0-4BA0-9181-1739A535A3AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0618BD26-0EF5-4774-9131-B5ABD4CD302A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D604DAE-DF63-413C-9F49-FFC8E84699F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DE6185-09F4-48E3-9742-F9D8030B5774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E70864-E077-4CD6-A0E8-BC2C4C298A6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E565E5-286D-4A68-B085-5659DFE59A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2A68B4-9101-4AC5-9E82-EEB5A5405541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA6C390-9BA7-4355-8C0A-CD68FF6AC236\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C75B125-E5BB-49A0-B12D-6CF40D8A5DB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70DDB53E-7A12-4A08-8999-DB68E6DF901E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6514EDE8-7C78-4C72-A313-E0915D89E4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5263F879-9B90-4582-B677-F133DEBE5259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C256B73C-9ABC-43D4-8C57-09161BC9F923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"055D1044-9FC5-45AA-8407-649E96C5AFE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C1C87A5-C14D-4A23-B865-3BB1FCDC8470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4DB0BB-BFD7-4E7A-B3EF-9C5422602216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D56153-E20A-46D8-859E-A51E5C03D674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C51A6F4-F88F-4BF2-BF71-5DC48559C085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC390CB-774C-47BE-95C3-059943A9E645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"379F6A73-B45F-4094-8167-4E929FFB1749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71DE7AC-553B-4524-8B33-5605518449EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B02389-0DCD-45BC-A09F-CB6B75940616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41AE4644-2D23-43EA-ABDA-7BE60EFD1EFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FB87608-0DF8-4729-95C5-CFA386AB3AC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A406214-29E5-4E13-B2E1-1CF72F1E60BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C169DA-26BC-42EE-817B-2F0685069495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C99BAF7-B48E-4402-B2BF-EB07235E402E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3F0C73F-291F-4A92-87B8-2269B5C1516D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C86FD617-E4FE-4F85-AAA4-4F968A9DEC9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938B1260-74A7-4CFF-8086-415DCC284430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28672BA-E3C2-40C3-80E1-95B7CDD089E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9308147C-0A23-48BC-BFA9-A49B9D73014E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6654EC3-BED6-4D6D-9B7F-DF4CC8E464BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CAD8DCC-DBB4-40EE-927C-7B0969700077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77F9CE47-E3AA-49D7-AEC9-447951AC31E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581615BB-C781-42CA-836E-0E0EAB8C4504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"257F43FA-D22C-4BF0-A02E-261A54142BCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8D63F5-78D5-4F7B-B15A-2C15FC405E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BC6D68-4ED4-43CF-A2EB-47BD15D11AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D291234-D64A-4E8A-A7CD-08BB980E1CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1FC6D1-8D93-4D87-9D73-7C6C0F8D45C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A3C27EC-5794-49C1-96E0-997E700B13DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97BDCEEC-25FE-4763-AC63-BA6B4F25E0C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC60781-766B-4B9C-B68D-45D51C5E5D20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"745C2CBA-4824-441B-A6BC-E80959C2E035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6A7D00-A203-4891-96CE-20C91FCBF048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8CB480-0595-4BC1-998E-3638E85DB367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7EAB8D-CA40-4C29-99DF-24FF1753BCF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9218A9-DA27-436A-AC93-F465FC14ECF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66503D7-72CB-42A5-8C85-D9579EF2C0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD7D204-3EBA-4D9E-B95A-86524B4C03D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBBF526-7A28-436B-9B01-EADE913602B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B373B409-0939-4707-99F1-95B121BFF7FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75A0BCE3-38E7-4318-9A7E-3D895171129A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E80CA1DE-B920-4E28-BEFC-574148D19A0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2303104C-4A91-4704-A9CB-8C83A859090E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCDAA51-4AA3-4EC4-B441-71FB3C3304F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04CA7AD2-79BA-4A73-ADAB-E3BCA3FD7F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D54ACD07-FAB7-4513-A707-18FAF7D565C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7260CE1F-501D-44FF-A3FA-2137CA01733B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D3DD1B-64DF-46C8-80A3-99D2E34B665F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF479C3-95A0-414F-B47B-C94BE95713D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48702EEB-C272-46ED-9C61-6F44D6964DDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC650D89-CEEC-4A90-B3B9-5F0ADCEFCBB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8C0115-94B1-4046-A599-E92DCFB936F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4033E532-7298-40DF-A582-22B7106035C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE19E377-CB55-4784-A003-5335D531AAF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF605F6-2A84-4DE5-AB62-282E9C46479B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F10B5E-0780-4756-919C-B0C00C673412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D930F0F-DCC3-4905-A4B1-288F0CCC6975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA0F9D4-B68A-4018-BC4E-95B87A1A8489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61CCB291-B71B-40D3-8493-215003851BDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD1FE7A-B888-461D-93F3-B71C94B4AA56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2727C9C-618D-4AEF-B7BE-8BE5935483F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95B21CE4-AF78-4D1B-A73E-84E83DB4A2C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F3528F-4E43-4D91-957E-49C7DB2A135A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E7706B2-D0F0-4E37-B9B5-8DA72413382B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BEE78E5-D163-4764-B3BB-5BE270549F5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58FC2EFB-CE85-4A65-A7B4-A0779F11B5BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B9EA91-A461-42CE-9ED7-3805BD13A4B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C48E432-8945-4918-B2A4-AD2E05A51633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A95B301-A72B-4F95-A7D6-4B574E9D3BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968C261F-A7D5-4EB6-BCFF-EE40DB5A11D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A115A0-D887-491D-99F6-8D5B47771760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB4C2C3-A535-4B87-90DC-44549555A452\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mozilla.org/security/announce/2011/mfsa2011-46.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1439.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=680880\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2011/mfsa2011-46.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1439.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=680880\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2011_1437
Vulnerability from csaf_redhat - Published: 2011-11-08 22:03 - Updated: 2024-11-22 04:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated firefox packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nA flaw was found in the way Firefox handled certain add-ons. A web page\ncontaining malicious content could cause an add-on to grant itself full\nbrowser privileges, which could lead to arbitrary code execution with the\nprivileges of the user running Firefox. (CVE-2011-3647)\n\nA cross-site scripting (XSS) flaw was found in the way Firefox handled\ncertain multibyte character sets. A web page containing malicious content\ncould cause Firefox to run JavaScript code with the permissions of a\ndifferent website. (CVE-2011-3648)\n\nA flaw was found in the way Firefox handled large JavaScript scripts. A web\npage containing malicious JavaScript could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2011-3650)\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 3.6.24. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 3.6.24, which corrects these issues. After installing the\nupdate, Firefox must be restarted for the changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1437",
"url": "https://access.redhat.com/errata/RHSA-2011:1437"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.24",
"url": "http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.24"
},
{
"category": "external",
"summary": "751931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751931"
},
{
"category": "external",
"summary": "751932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751932"
},
{
"category": "external",
"summary": "751933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751933"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1437.json"
}
],
"title": "Red Hat Security Advisory: firefox security update",
"tracking": {
"current_release_date": "2024-11-22T04:50:38+00:00",
"generator": {
"date": "2024-11-22T04:50:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1437",
"initial_release_date": "2011-11-08T22:03:00+00:00",
"revision_history": [
{
"date": "2011-11-08T22:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-11-08T22:05:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:50:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.ia64",
"product": {
"name": "firefox-0:3.6.24-3.el4.ia64",
"product_id": "firefox-0:3.6.24-3.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.ia64",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.ia64",
"product_id": "firefox-0:3.6.24-3.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.src",
"product": {
"name": "firefox-0:3.6.24-3.el4.src",
"product_id": "firefox-0:3.6.24-3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.src",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.src",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=src"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.src",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.src",
"product_id": "firefox-0:3.6.24-3.el5_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=src"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.src",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.src",
"product_id": "firefox-0:3.6.24-3.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.i386",
"product": {
"name": "firefox-0:3.6.24-3.el4.i386",
"product_id": "firefox-0:3.6.24-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.i386",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.i386",
"product_id": "firefox-0:3.6.24-3.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.x86_64",
"product": {
"name": "firefox-0:3.6.24-3.el4.x86_64",
"product_id": "firefox-0:3.6.24-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.x86_64",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.x86_64",
"product_id": "firefox-0:3.6.24-3.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.x86_64",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.x86_64",
"product_id": "firefox-0:3.6.24-3.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.ppc",
"product": {
"name": "firefox-0:3.6.24-3.el4.ppc",
"product_id": "firefox-0:3.6.24-3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.ppc",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.ppc",
"product_id": "firefox-0:3.6.24-3.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.ppc",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.ppc",
"product_id": "firefox-0:3.6.24-3.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.s390x",
"product": {
"name": "firefox-0:3.6.24-3.el4.s390x",
"product_id": "firefox-0:3.6.24-3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.s390x",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.s390x",
"product_id": "firefox-0:3.6.24-3.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.s390x",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.s390x",
"product_id": "firefox-0:3.6.24-3.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.s390",
"product": {
"name": "firefox-0:3.6.24-3.el4.s390",
"product_id": "firefox-0:3.6.24-3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.s390",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.s390",
"product_id": "firefox-0:3.6.24-3.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.s390",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.s390",
"product_id": "firefox-0:3.6.24-3.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.ppc64",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.ppc64",
"product_id": "firefox-0:3.6.24-3.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.i686",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.i686",
"product_id": "firefox-0:3.6.24-3.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.src"
},
"product_reference": "firefox-0:3.6.24-3.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.src"
},
"product_reference": "firefox-0:3.6.24-3.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.src"
},
"product_reference": "firefox-0:3.6.24-3.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.src"
},
"product_reference": "firefox-0:3.6.24-3.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.src",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3647",
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751931"
}
],
"notes": [
{
"category": "description",
"text": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3647"
},
{
"category": "external",
"summary": "RHBZ#751931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3647"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T22:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1437"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46)"
},
{
"cve": "CVE-2011-3648",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751932"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3648"
},
{
"category": "external",
"summary": "RHBZ#751932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751932"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3648"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T22:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1437"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)"
},
{
"cve": "CVE-2011-3650",
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751933"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: crash while profiling page with many functions (MFSA 2011-49)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3650"
},
{
"category": "external",
"summary": "RHBZ#751933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3650"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T22:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1437"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: crash while profiling page with many functions (MFSA 2011-49)"
}
]
}
RHSA-2011:1439
Vulnerability from csaf_redhat - Published: 2011-11-08 21:47 - Updated: 2025-11-21 17:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated thunderbird package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled certain add-ons. Malicious,\nremote content could cause an add-on to elevate its privileges, which could\nlead to arbitrary code execution with the privileges of the user running\nThunderbird. (CVE-2011-3647)\n\nA cross-site scripting (XSS) flaw was found in the way Thunderbird handled\ncertain multibyte character sets. Malicious, remote content could cause\nThunderbird to run JavaScript code with the permissions of different\nremote content. (CVE-2011-3648)\n\nA flaw was found in the way Thunderbird handled large JavaScript scripts.\nMalicious, remote content could cause Thunderbird to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Thunderbird.\n(CVE-2011-3650)\n\nAll Thunderbird users should upgrade to this updated package, which\nresolves these issues. All running instances of Thunderbird must be\nrestarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1439",
"url": "https://access.redhat.com/errata/RHSA-2011:1439"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "751931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751931"
},
{
"category": "external",
"summary": "751932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751932"
},
{
"category": "external",
"summary": "751933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751933"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1439.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2025-11-21T17:39:11+00:00",
"generator": {
"date": "2025-11-21T17:39:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:1439",
"initial_release_date": "2011-11-08T21:47:00+00:00",
"revision_history": [
{
"date": "2011-11-08T21:47:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-11-08T21:54:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:39:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.i686",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.i686",
"product_id": "thunderbird-0:3.1.16-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"product": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"product_id": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.16-2.el6_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.ppc64",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.ppc64",
"product_id": "thunderbird-0:3.1.16-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"product": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"product_id": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.16-2.el6_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.src",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.src",
"product_id": "thunderbird-0:3.1.16-2.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.s390x",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.s390x",
"product_id": "thunderbird-0:3.1.16-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"product": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"product_id": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.16-2.el6_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.x86_64",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.x86_64",
"product_id": "thunderbird-0:3.1.16-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64",
"product_id": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.16-2.el6_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686"
},
"product_reference": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64"
},
"product_reference": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3647",
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751931"
}
],
"notes": [
{
"category": "description",
"text": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3647"
},
{
"category": "external",
"summary": "RHBZ#751931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3647"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T21:47:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1439"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46)"
},
{
"cve": "CVE-2011-3648",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751932"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3648"
},
{
"category": "external",
"summary": "RHBZ#751932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751932"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3648"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T21:47:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1439"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)"
},
{
"cve": "CVE-2011-3650",
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751933"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: crash while profiling page with many functions (MFSA 2011-49)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3650"
},
{
"category": "external",
"summary": "RHBZ#751933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3650"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T21:47:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1439"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: crash while profiling page with many functions (MFSA 2011-49)"
}
]
}
RHSA-2011:1437
Vulnerability from csaf_redhat - Published: 2011-11-08 22:03 - Updated: 2025-11-21 17:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated firefox packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nA flaw was found in the way Firefox handled certain add-ons. A web page\ncontaining malicious content could cause an add-on to grant itself full\nbrowser privileges, which could lead to arbitrary code execution with the\nprivileges of the user running Firefox. (CVE-2011-3647)\n\nA cross-site scripting (XSS) flaw was found in the way Firefox handled\ncertain multibyte character sets. A web page containing malicious content\ncould cause Firefox to run JavaScript code with the permissions of a\ndifferent website. (CVE-2011-3648)\n\nA flaw was found in the way Firefox handled large JavaScript scripts. A web\npage containing malicious JavaScript could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2011-3650)\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 3.6.24. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 3.6.24, which corrects these issues. After installing the\nupdate, Firefox must be restarted for the changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1437",
"url": "https://access.redhat.com/errata/RHSA-2011:1437"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.24",
"url": "http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.24"
},
{
"category": "external",
"summary": "751931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751931"
},
{
"category": "external",
"summary": "751932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751932"
},
{
"category": "external",
"summary": "751933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751933"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1437.json"
}
],
"title": "Red Hat Security Advisory: firefox security update",
"tracking": {
"current_release_date": "2025-11-21T17:39:11+00:00",
"generator": {
"date": "2025-11-21T17:39:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:1437",
"initial_release_date": "2011-11-08T22:03:00+00:00",
"revision_history": [
{
"date": "2011-11-08T22:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-11-08T22:05:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:39:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.ia64",
"product": {
"name": "firefox-0:3.6.24-3.el4.ia64",
"product_id": "firefox-0:3.6.24-3.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.ia64",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.ia64",
"product_id": "firefox-0:3.6.24-3.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.src",
"product": {
"name": "firefox-0:3.6.24-3.el4.src",
"product_id": "firefox-0:3.6.24-3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.src",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.src",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=src"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.src",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.src",
"product_id": "firefox-0:3.6.24-3.el5_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=src"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.src",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.src",
"product_id": "firefox-0:3.6.24-3.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.i386",
"product": {
"name": "firefox-0:3.6.24-3.el4.i386",
"product_id": "firefox-0:3.6.24-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.i386",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.i386",
"product_id": "firefox-0:3.6.24-3.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.x86_64",
"product": {
"name": "firefox-0:3.6.24-3.el4.x86_64",
"product_id": "firefox-0:3.6.24-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.x86_64",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.x86_64",
"product_id": "firefox-0:3.6.24-3.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.x86_64",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.x86_64",
"product_id": "firefox-0:3.6.24-3.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.ppc",
"product": {
"name": "firefox-0:3.6.24-3.el4.ppc",
"product_id": "firefox-0:3.6.24-3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.ppc",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.ppc",
"product_id": "firefox-0:3.6.24-3.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.ppc",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.ppc",
"product_id": "firefox-0:3.6.24-3.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.s390x",
"product": {
"name": "firefox-0:3.6.24-3.el4.s390x",
"product_id": "firefox-0:3.6.24-3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.s390x",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.s390x",
"product_id": "firefox-0:3.6.24-3.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.s390x",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.s390x",
"product_id": "firefox-0:3.6.24-3.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el4.s390",
"product": {
"name": "firefox-0:3.6.24-3.el4.s390",
"product_id": "firefox-0:3.6.24-3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"product_id": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el5_7.s390",
"product": {
"name": "firefox-0:3.6.24-3.el5_7.s390",
"product_id": "firefox-0:3.6.24-3.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"product_id": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el5_7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.s390",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.s390",
"product_id": "firefox-0:3.6.24-3.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el5_7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"product_id": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el5_7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el5_7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.ppc64",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.ppc64",
"product_id": "firefox-0:3.6.24-3.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"product": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"product_id": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.2.24-2.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"product": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"product_id": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner-devel@1.9.2.24-2.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"product": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"product_id": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xulrunner@1.9.2.24-2.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "firefox-0:3.6.24-3.el6_1.i686",
"product": {
"name": "firefox-0:3.6.24-3.el6_1.i686",
"product_id": "firefox-0:3.6.24-3.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@3.6.24-3.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"product": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"product_id": "firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@3.6.24-3.el6_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.src"
},
"product_reference": "firefox-0:3.6.24-3.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.src"
},
"product_reference": "firefox-0:3.6.24-3.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.src"
},
"product_reference": "firefox-0:3.6.24-3.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.src"
},
"product_reference": "firefox-0:3.6.24-3.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.src",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:3.6.24-3.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64"
},
"product_reference": "firefox-0:3.6.24-3.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64"
},
"product_reference": "firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
},
"product_reference": "xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3647",
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751931"
}
],
"notes": [
{
"category": "description",
"text": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3647"
},
{
"category": "external",
"summary": "RHBZ#751931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3647"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T22:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1437"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46)"
},
{
"cve": "CVE-2011-3648",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751932"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3648"
},
{
"category": "external",
"summary": "RHBZ#751932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751932"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3648"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T22:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1437"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)"
},
{
"cve": "CVE-2011-3650",
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751933"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: crash while profiling page with many functions (MFSA 2011-49)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3650"
},
{
"category": "external",
"summary": "RHBZ#751933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3650"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T22:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1437"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:firefox-0:3.6.24-3.el4.i386",
"4AS:firefox-0:3.6.24-3.el4.ia64",
"4AS:firefox-0:3.6.24-3.el4.ppc",
"4AS:firefox-0:3.6.24-3.el4.s390",
"4AS:firefox-0:3.6.24-3.el4.s390x",
"4AS:firefox-0:3.6.24-3.el4.src",
"4AS:firefox-0:3.6.24-3.el4.x86_64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4AS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-0:3.6.24-3.el4.i386",
"4Desktop:firefox-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-0:3.6.24-3.el4.s390",
"4Desktop:firefox-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-0:3.6.24-3.el4.src",
"4Desktop:firefox-0:3.6.24-3.el4.x86_64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4Desktop:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4ES:firefox-0:3.6.24-3.el4.i386",
"4ES:firefox-0:3.6.24-3.el4.ia64",
"4ES:firefox-0:3.6.24-3.el4.ppc",
"4ES:firefox-0:3.6.24-3.el4.s390",
"4ES:firefox-0:3.6.24-3.el4.s390x",
"4ES:firefox-0:3.6.24-3.el4.src",
"4ES:firefox-0:3.6.24-3.el4.x86_64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4ES:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"4WS:firefox-0:3.6.24-3.el4.i386",
"4WS:firefox-0:3.6.24-3.el4.ia64",
"4WS:firefox-0:3.6.24-3.el4.ppc",
"4WS:firefox-0:3.6.24-3.el4.s390",
"4WS:firefox-0:3.6.24-3.el4.s390x",
"4WS:firefox-0:3.6.24-3.el4.src",
"4WS:firefox-0:3.6.24-3.el4.x86_64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.i386",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ia64",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.ppc",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.s390x",
"4WS:firefox-debuginfo-0:3.6.24-3.el4.x86_64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Client-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Client-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Client-Workstation-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Client-Workstation-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.src",
"5Server-5.7.Z:firefox-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.i386",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ia64",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.ppc",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.s390x",
"5Server-5.7.Z:firefox-debuginfo-0:3.6.24-3.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.src",
"5Server-5.7.Z:xulrunner-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-debuginfo-0:1.9.2.24-2.el5_7.x86_64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.i386",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ia64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.ppc64",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.s390x",
"5Server-5.7.Z:xulrunner-devel-0:1.9.2.24-2.el5_7.x86_64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.src",
"6Server-6.1.z:firefox-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.i686",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.ppc64",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.s390x",
"6Server-6.1.z:firefox-debuginfo-0:3.6.24-3.el6_1.x86_64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.src",
"6Server-optional-6.1.z:xulrunner-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-debuginfo-0:1.9.2.24-2.el6_1.1.x86_64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.i686",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.ppc64",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.s390x",
"6Server-optional-6.1.z:xulrunner-devel-0:1.9.2.24-2.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: crash while profiling page with many functions (MFSA 2011-49)"
}
]
}
RHSA-2011_1439
Vulnerability from csaf_redhat - Published: 2011-11-08 21:47 - Updated: 2024-11-22 04:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated thunderbird package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled certain add-ons. Malicious,\nremote content could cause an add-on to elevate its privileges, which could\nlead to arbitrary code execution with the privileges of the user running\nThunderbird. (CVE-2011-3647)\n\nA cross-site scripting (XSS) flaw was found in the way Thunderbird handled\ncertain multibyte character sets. Malicious, remote content could cause\nThunderbird to run JavaScript code with the permissions of different\nremote content. (CVE-2011-3648)\n\nA flaw was found in the way Thunderbird handled large JavaScript scripts.\nMalicious, remote content could cause Thunderbird to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Thunderbird.\n(CVE-2011-3650)\n\nAll Thunderbird users should upgrade to this updated package, which\nresolves these issues. All running instances of Thunderbird must be\nrestarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1439",
"url": "https://access.redhat.com/errata/RHSA-2011:1439"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "751931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751931"
},
{
"category": "external",
"summary": "751932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751932"
},
{
"category": "external",
"summary": "751933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751933"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1439.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2024-11-22T04:50:46+00:00",
"generator": {
"date": "2024-11-22T04:50:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1439",
"initial_release_date": "2011-11-08T21:47:00+00:00",
"revision_history": [
{
"date": "2011-11-08T21:47:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-11-08T21:54:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:50:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.i686",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.i686",
"product_id": "thunderbird-0:3.1.16-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"product": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"product_id": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.16-2.el6_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.ppc64",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.ppc64",
"product_id": "thunderbird-0:3.1.16-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"product": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"product_id": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.16-2.el6_1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.src",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.src",
"product_id": "thunderbird-0:3.1.16-2.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.s390x",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.s390x",
"product_id": "thunderbird-0:3.1.16-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"product": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"product_id": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.16-2.el6_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:3.1.16-2.el6_1.x86_64",
"product": {
"name": "thunderbird-0:3.1.16-2.el6_1.x86_64",
"product_id": "thunderbird-0:3.1.16-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@3.1.16-2.el6_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64",
"product_id": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@3.1.16-2.el6_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:3.1.16-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64"
},
"product_reference": "thunderbird-0:3.1.16-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686"
},
"product_reference": "thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64"
},
"product_reference": "thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3647",
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751931"
}
],
"notes": [
{
"category": "description",
"text": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3647"
},
{
"category": "external",
"summary": "RHBZ#751931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3647"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T21:47:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1439"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46)"
},
{
"cve": "CVE-2011-3648",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751932"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3648"
},
{
"category": "external",
"summary": "RHBZ#751932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751932"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3648"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T21:47:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1439"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)"
},
{
"cve": "CVE-2011-3650",
"discovery_date": "2011-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "751933"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mozilla: crash while profiling page with many functions (MFSA 2011-49)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3650"
},
{
"category": "external",
"summary": "RHBZ#751933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3650"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html"
}
],
"release_date": "2011-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-08T21:47:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1439"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.src",
"6Server-optional-6.1.z:thunderbird-0:3.1.16-2.el6_1.x86_64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.i686",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.ppc64",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.s390x",
"6Server-optional-6.1.z:thunderbird-debuginfo-0:3.1.16-2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Mozilla: crash while profiling page with many functions (MFSA 2011-49)"
}
]
}
CERTA-2011-AVI-626
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits de la fondation Mozilla, dont quatre sont considérées comme critiques.
Description
De multiples vulnérabilités ont été corrigées dans les produits de la fondation Mozilla:
- mfsa2011-46 : vulnérabilité dans la fonction JSSubScript utilisée par certains modules pouvant être exploitée par du contenu Web malveillant pour élever ses privilèges (cette vulnérabilité a déjà été corrigée dans les branches principales des produits, mais est maintenant également corrigée dans Firefox 3.6.24 et Thunderbird 3.1.16) ;
- mfsa2011-47 : vulnérabilité dans le traitement de données codées en Shift-JIS, pouvant être exploitée pour injecter du code indirectement à distance (XSS) ;
- mfsa2011-48 : plusieurs vulnérabilités dans le moteur de navigation, dont certaines pourraient conduire à une corruption de la mémoire et permettre d'exécuter du code arbitraire à distance dans des circonstances particulières ;
- mfsa2011-49 : arrêt inopiné de Firebug dans le traitement d'un fichier Javascript spécialement conçu ;
- mfsa2011-50 : Problème de confidentialité des données dans l'utilisation de l'accélération graphique Windows D2D ;
- mfsa2011-51 : problème dans les pilotes graphiques sur MacOS X qui peut être exploité par un site Web spécialement conçu pour lire des données antérieures du navigateur ;
- mfsa2011-52 : Vulnérabilité dans NoWaiverWrappers pouvant être exploitée pour une élévation des privilèges.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox | Firefox versions antérieures à 3.6.24 ; | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 8.0 ; | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 3.1.16. | ||
| Mozilla | Firefox | Firefox versions antérieures à 8.0 ; |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 3.6.24 ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 8.0 ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 3.1.16.",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 8.0 ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits de la\nfondation Mozilla:\n\n- mfsa2011-46 : vuln\u00e9rabilit\u00e9 dans la fonction JSSubScript utilis\u00e9e\n par certains modules pouvant \u00eatre exploit\u00e9e par du contenu Web\n malveillant pour \u00e9lever ses privil\u00e8ges (cette vuln\u00e9rabilit\u00e9 a d\u00e9j\u00e0\n \u00e9t\u00e9 corrig\u00e9e dans les branches principales des produits, mais est\n maintenant \u00e9galement corrig\u00e9e dans Firefox 3.6.24 et Thunderbird\n 3.1.16) ;\n- mfsa2011-47 : vuln\u00e9rabilit\u00e9 dans le traitement de donn\u00e9es cod\u00e9es en\n Shift-JIS, pouvant \u00eatre exploit\u00e9e pour injecter du code\n indirectement \u00e0 distance (XSS) ;\n- mfsa2011-48 : plusieurs vuln\u00e9rabilit\u00e9s dans le moteur de navigation,\n dont certaines pourraient conduire \u00e0 une corruption de la m\u00e9moire et\n permettre d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance dans des\n circonstances particuli\u00e8res ;\n- mfsa2011-49 : arr\u00eat inopin\u00e9 de Firebug dans le traitement d\u0027un\n fichier Javascript sp\u00e9cialement con\u00e7u ;\n- mfsa2011-50 : Probl\u00e8me de confidentialit\u00e9 des donn\u00e9es dans\n l\u0027utilisation de l\u0027acc\u00e9l\u00e9ration graphique Windows D2D ;\n- mfsa2011-51 : probl\u00e8me dans les pilotes graphiques sur MacOS X qui\n peut \u00eatre exploit\u00e9 par un site Web sp\u00e9cialement con\u00e7u pour lire des\n donn\u00e9es ant\u00e9rieures du navigateur ;\n- mfsa2011-52 : Vuln\u00e9rabilit\u00e9 dans NoWaiverWrappers pouvant \u00eatre\n exploit\u00e9e pour une \u00e9l\u00e9vation des privil\u00e8ges.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3650"
},
{
"name": "CVE-2011-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3653"
},
{
"name": "CVE-2011-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3655"
},
{
"name": "CVE-2011-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3649"
},
{
"name": "CVE-2011-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3651"
},
{
"name": "CVE-2011-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3648"
},
{
"name": "CVE-2011-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3647"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-52 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-52.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-50 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-50.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-48 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-48.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-49 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-46 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-51 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-51.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-47 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html"
}
],
"reference": "CERTA-2011-AVI-626",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-11-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits de la\nfondation Mozilla, dont quatre sont consid\u00e9r\u00e9es comme critiques.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla du 08 novembre 2011",
"url": null
}
]
}
CERTA-2011-AVI-626
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits de la fondation Mozilla, dont quatre sont considérées comme critiques.
Description
De multiples vulnérabilités ont été corrigées dans les produits de la fondation Mozilla:
- mfsa2011-46 : vulnérabilité dans la fonction JSSubScript utilisée par certains modules pouvant être exploitée par du contenu Web malveillant pour élever ses privilèges (cette vulnérabilité a déjà été corrigée dans les branches principales des produits, mais est maintenant également corrigée dans Firefox 3.6.24 et Thunderbird 3.1.16) ;
- mfsa2011-47 : vulnérabilité dans le traitement de données codées en Shift-JIS, pouvant être exploitée pour injecter du code indirectement à distance (XSS) ;
- mfsa2011-48 : plusieurs vulnérabilités dans le moteur de navigation, dont certaines pourraient conduire à une corruption de la mémoire et permettre d'exécuter du code arbitraire à distance dans des circonstances particulières ;
- mfsa2011-49 : arrêt inopiné de Firebug dans le traitement d'un fichier Javascript spécialement conçu ;
- mfsa2011-50 : Problème de confidentialité des données dans l'utilisation de l'accélération graphique Windows D2D ;
- mfsa2011-51 : problème dans les pilotes graphiques sur MacOS X qui peut être exploité par un site Web spécialement conçu pour lire des données antérieures du navigateur ;
- mfsa2011-52 : Vulnérabilité dans NoWaiverWrappers pouvant être exploitée pour une élévation des privilèges.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox | Firefox versions antérieures à 3.6.24 ; | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 8.0 ; | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 3.1.16. | ||
| Mozilla | Firefox | Firefox versions antérieures à 8.0 ; |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 3.6.24 ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 8.0 ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 3.1.16.",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 8.0 ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits de la\nfondation Mozilla:\n\n- mfsa2011-46 : vuln\u00e9rabilit\u00e9 dans la fonction JSSubScript utilis\u00e9e\n par certains modules pouvant \u00eatre exploit\u00e9e par du contenu Web\n malveillant pour \u00e9lever ses privil\u00e8ges (cette vuln\u00e9rabilit\u00e9 a d\u00e9j\u00e0\n \u00e9t\u00e9 corrig\u00e9e dans les branches principales des produits, mais est\n maintenant \u00e9galement corrig\u00e9e dans Firefox 3.6.24 et Thunderbird\n 3.1.16) ;\n- mfsa2011-47 : vuln\u00e9rabilit\u00e9 dans le traitement de donn\u00e9es cod\u00e9es en\n Shift-JIS, pouvant \u00eatre exploit\u00e9e pour injecter du code\n indirectement \u00e0 distance (XSS) ;\n- mfsa2011-48 : plusieurs vuln\u00e9rabilit\u00e9s dans le moteur de navigation,\n dont certaines pourraient conduire \u00e0 une corruption de la m\u00e9moire et\n permettre d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance dans des\n circonstances particuli\u00e8res ;\n- mfsa2011-49 : arr\u00eat inopin\u00e9 de Firebug dans le traitement d\u0027un\n fichier Javascript sp\u00e9cialement con\u00e7u ;\n- mfsa2011-50 : Probl\u00e8me de confidentialit\u00e9 des donn\u00e9es dans\n l\u0027utilisation de l\u0027acc\u00e9l\u00e9ration graphique Windows D2D ;\n- mfsa2011-51 : probl\u00e8me dans les pilotes graphiques sur MacOS X qui\n peut \u00eatre exploit\u00e9 par un site Web sp\u00e9cialement con\u00e7u pour lire des\n donn\u00e9es ant\u00e9rieures du navigateur ;\n- mfsa2011-52 : Vuln\u00e9rabilit\u00e9 dans NoWaiverWrappers pouvant \u00eatre\n exploit\u00e9e pour une \u00e9l\u00e9vation des privil\u00e8ges.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3650"
},
{
"name": "CVE-2011-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3653"
},
{
"name": "CVE-2011-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3655"
},
{
"name": "CVE-2011-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3649"
},
{
"name": "CVE-2011-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3651"
},
{
"name": "CVE-2011-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3648"
},
{
"name": "CVE-2011-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3647"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-52 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-52.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-50 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-50.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-48 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-48.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-49 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-46 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-51 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-51.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2011/mfsa2011-47 du 08 novembre 2011 :",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-47.html"
}
],
"reference": "CERTA-2011-AVI-626",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-11-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits de la\nfondation Mozilla, dont quatre sont consid\u00e9r\u00e9es comme critiques.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 de la fondation Mozilla du 08 novembre 2011",
"url": null
}
]
}
GSD-2011-3647
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-3647",
"description": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.",
"id": "GSD-2011-3647",
"references": [
"https://www.suse.com/security/cve/CVE-2011-3647.html",
"https://www.debian.org/security/2011/dsa-2345",
"https://www.debian.org/security/2011/dsa-2341",
"https://www.debian.org/security/2011/dsa-2342",
"https://access.redhat.com/errata/RHSA-2011:1439",
"https://access.redhat.com/errata/RHSA-2011:1437",
"https://linux.oracle.com/cve/CVE-2011-3647.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-3647"
],
"details": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.",
"id": "GSD-2011-3647",
"modified": "2023-12-13T01:19:10.162400Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3647",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880"
},
{
"name": "RHSA-2011:1439",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
},
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"name": "SUSE-SU-2011:1256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
},
{
"name": "oval:org.mitre.oval:def:13550",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6.23",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.1.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3647"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880"
},
{
"name": "RHSA-2011:1439",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
},
{
"name": "SUSE-SU-2011:1256",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
},
{
"name": "oval:org.mitre.oval:def:13550",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-09-19T01:34Z",
"publishedDate": "2011-11-09T11:55Z"
}
}
}
GHSA-JQQV-7CC8-34QH
Vulnerability from github – Published: 2022-05-17 01:00 – Updated: 2022-05-17 01:00The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.
{
"affected": [],
"aliases": [
"CVE-2011-3647"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-11-09T11:55:00Z",
"severity": "HIGH"
},
"details": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.",
"id": "GHSA-jqqv-7cc8-34qh",
"modified": "2022-05-17T01:00:16Z",
"published": "2022-05-17T01:00:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3647"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2011-3647
Vulnerability from fkie_nvd - Published: 2011-11-09 11:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html | ||
| cve@mitre.org | http://www.mozilla.org/security/announce/2011/mfsa2011-46.html | Vendor Advisory | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-1439.html | ||
| cve@mitre.org | https://bugzilla.mozilla.org/show_bug.cgi?id=680880 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mozilla.org/security/announce/2011/mfsa2011-46.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-1439.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=680880 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550 |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox | 0.1 | |
| mozilla | firefox | 0.2 | |
| mozilla | firefox | 0.3 | |
| mozilla | firefox | 0.4 | |
| mozilla | firefox | 0.5 | |
| mozilla | firefox | 0.6 | |
| mozilla | firefox | 0.6.1 | |
| mozilla | firefox | 0.7 | |
| mozilla | firefox | 0.7.1 | |
| mozilla | firefox | 0.8 | |
| mozilla | firefox | 0.9 | |
| mozilla | firefox | 0.9 | |
| mozilla | firefox | 0.9.1 | |
| mozilla | firefox | 0.9.2 | |
| mozilla | firefox | 0.9.3 | |
| mozilla | firefox | 0.10 | |
| mozilla | firefox | 0.10.1 | |
| mozilla | firefox | 1.0 | |
| mozilla | firefox | 1.0 | |
| mozilla | firefox | 1.0.1 | |
| mozilla | firefox | 1.0.2 | |
| mozilla | firefox | 1.0.3 | |
| mozilla | firefox | 1.0.4 | |
| mozilla | firefox | 1.0.5 | |
| mozilla | firefox | 1.0.6 | |
| mozilla | firefox | 1.0.7 | |
| mozilla | firefox | 1.0.8 | |
| mozilla | firefox | 1.4.1 | |
| mozilla | firefox | 1.5 | |
| mozilla | firefox | 1.5 | |
| mozilla | firefox | 1.5 | |
| mozilla | firefox | 1.5.0.1 | |
| mozilla | firefox | 1.5.0.2 | |
| mozilla | firefox | 1.5.0.3 | |
| mozilla | firefox | 1.5.0.4 | |
| mozilla | firefox | 1.5.0.5 | |
| mozilla | firefox | 1.5.0.6 | |
| mozilla | firefox | 1.5.0.7 | |
| mozilla | firefox | 1.5.0.8 | |
| mozilla | firefox | 1.5.0.9 | |
| mozilla | firefox | 1.5.0.10 | |
| mozilla | firefox | 1.5.0.11 | |
| mozilla | firefox | 1.5.0.12 | |
| mozilla | firefox | 1.5.1 | |
| mozilla | firefox | 1.5.2 | |
| mozilla | firefox | 1.5.3 | |
| mozilla | firefox | 1.5.4 | |
| mozilla | firefox | 1.5.5 | |
| mozilla | firefox | 1.5.6 | |
| mozilla | firefox | 1.5.7 | |
| mozilla | firefox | 1.5.8 | |
| mozilla | firefox | 1.8 | |
| mozilla | firefox | 2.0 | |
| mozilla | firefox | 2.0.0.1 | |
| mozilla | firefox | 2.0.0.2 | |
| mozilla | firefox | 2.0.0.3 | |
| mozilla | firefox | 2.0.0.4 | |
| mozilla | firefox | 2.0.0.5 | |
| mozilla | firefox | 2.0.0.6 | |
| mozilla | firefox | 2.0.0.7 | |
| mozilla | firefox | 2.0.0.8 | |
| mozilla | firefox | 2.0.0.9 | |
| mozilla | firefox | 2.0.0.10 | |
| mozilla | firefox | 2.0.0.11 | |
| mozilla | firefox | 2.0.0.12 | |
| mozilla | firefox | 2.0.0.13 | |
| mozilla | firefox | 2.0.0.14 | |
| mozilla | firefox | 2.0.0.15 | |
| mozilla | firefox | 2.0.0.16 | |
| mozilla | firefox | 2.0.0.17 | |
| mozilla | firefox | 2.0.0.18 | |
| mozilla | firefox | 2.0.0.19 | |
| mozilla | firefox | 2.0.0.20 | |
| mozilla | firefox | 3.0 | |
| mozilla | firefox | 3.0.1 | |
| mozilla | firefox | 3.0.2 | |
| mozilla | firefox | 3.0.3 | |
| mozilla | firefox | 3.0.4 | |
| mozilla | firefox | 3.0.5 | |
| mozilla | firefox | 3.0.6 | |
| mozilla | firefox | 3.0.7 | |
| mozilla | firefox | 3.0.8 | |
| mozilla | firefox | 3.0.9 | |
| mozilla | firefox | 3.0.10 | |
| mozilla | firefox | 3.0.11 | |
| mozilla | firefox | 3.0.12 | |
| mozilla | firefox | 3.0.13 | |
| mozilla | firefox | 3.0.14 | |
| mozilla | firefox | 3.0.15 | |
| mozilla | firefox | 3.0.16 | |
| mozilla | firefox | 3.0.17 | |
| mozilla | firefox | 3.5 | |
| mozilla | firefox | 3.5.1 | |
| mozilla | firefox | 3.5.2 | |
| mozilla | firefox | 3.5.3 | |
| mozilla | firefox | 3.5.4 | |
| mozilla | firefox | 3.5.5 | |
| mozilla | firefox | 3.5.6 | |
| mozilla | firefox | 3.5.7 | |
| mozilla | firefox | 3.5.8 | |
| mozilla | firefox | 3.5.9 | |
| mozilla | firefox | 3.5.10 | |
| mozilla | firefox | 3.5.11 | |
| mozilla | firefox | 3.5.12 | |
| mozilla | firefox | 3.5.13 | |
| mozilla | firefox | 3.5.14 | |
| mozilla | firefox | 3.5.15 | |
| mozilla | firefox | 3.6 | |
| mozilla | firefox | 3.6.2 | |
| mozilla | firefox | 3.6.3 | |
| mozilla | firefox | 3.6.4 | |
| mozilla | firefox | 3.6.6 | |
| mozilla | firefox | 3.6.7 | |
| mozilla | firefox | 3.6.8 | |
| mozilla | firefox | 3.6.9 | |
| mozilla | firefox | 3.6.10 | |
| mozilla | firefox | 3.6.11 | |
| mozilla | firefox | 3.6.12 | |
| mozilla | firefox | 3.6.13 | |
| mozilla | firefox | 3.6.14 | |
| mozilla | firefox | 3.6.15 | |
| mozilla | firefox | 3.6.16 | |
| mozilla | firefox | 3.6.17 | |
| mozilla | firefox | 3.6.18 | |
| mozilla | firefox | 3.6.19 | |
| mozilla | firefox | 3.6.20 | |
| mozilla | firefox | 3.6.21 | |
| mozilla | firefox | 3.6.22 | |
| mozilla | thunderbird | * | |
| mozilla | thunderbird | 0.1 | |
| mozilla | thunderbird | 0.2 | |
| mozilla | thunderbird | 0.3 | |
| mozilla | thunderbird | 0.4 | |
| mozilla | thunderbird | 0.5 | |
| mozilla | thunderbird | 0.6 | |
| mozilla | thunderbird | 0.7 | |
| mozilla | thunderbird | 0.7.1 | |
| mozilla | thunderbird | 0.7.2 | |
| mozilla | thunderbird | 0.7.3 | |
| mozilla | thunderbird | 0.8 | |
| mozilla | thunderbird | 0.9 | |
| mozilla | thunderbird | 1.0 | |
| mozilla | thunderbird | 1.0.1 | |
| mozilla | thunderbird | 1.0.2 | |
| mozilla | thunderbird | 1.0.3 | |
| mozilla | thunderbird | 1.0.4 | |
| mozilla | thunderbird | 1.0.5 | |
| mozilla | thunderbird | 1.0.5 | |
| mozilla | thunderbird | 1.0.6 | |
| mozilla | thunderbird | 1.0.7 | |
| mozilla | thunderbird | 1.0.8 | |
| mozilla | thunderbird | 1.5 | |
| mozilla | thunderbird | 1.5 | |
| mozilla | thunderbird | 1.5.0.1 | |
| mozilla | thunderbird | 1.5.0.2 | |
| mozilla | thunderbird | 1.5.0.3 | |
| mozilla | thunderbird | 1.5.0.4 | |
| mozilla | thunderbird | 1.5.0.5 | |
| mozilla | thunderbird | 1.5.0.6 | |
| mozilla | thunderbird | 1.5.0.7 | |
| mozilla | thunderbird | 1.5.0.8 | |
| mozilla | thunderbird | 1.5.0.9 | |
| mozilla | thunderbird | 1.5.0.10 | |
| mozilla | thunderbird | 1.5.0.11 | |
| mozilla | thunderbird | 1.5.0.12 | |
| mozilla | thunderbird | 1.5.0.13 | |
| mozilla | thunderbird | 1.5.0.14 | |
| mozilla | thunderbird | 1.5.1 | |
| mozilla | thunderbird | 1.5.2 | |
| mozilla | thunderbird | 1.7.1 | |
| mozilla | thunderbird | 1.7.3 | |
| mozilla | thunderbird | 2.0 | |
| mozilla | thunderbird | 2.0.0.0 | |
| mozilla | thunderbird | 2.0.0.1 | |
| mozilla | thunderbird | 2.0.0.2 | |
| mozilla | thunderbird | 2.0.0.3 | |
| mozilla | thunderbird | 2.0.0.4 | |
| mozilla | thunderbird | 2.0.0.5 | |
| mozilla | thunderbird | 2.0.0.6 | |
| mozilla | thunderbird | 2.0.0.7 | |
| mozilla | thunderbird | 2.0.0.8 | |
| mozilla | thunderbird | 2.0.0.9 | |
| mozilla | thunderbird | 2.0.0.11 | |
| mozilla | thunderbird | 2.0.0.12 | |
| mozilla | thunderbird | 2.0.0.13 | |
| mozilla | thunderbird | 2.0.0.14 | |
| mozilla | thunderbird | 2.0.0.15 | |
| mozilla | thunderbird | 2.0.0.16 | |
| mozilla | thunderbird | 2.0.0.17 | |
| mozilla | thunderbird | 2.0.0.18 | |
| mozilla | thunderbird | 2.0.0.19 | |
| mozilla | thunderbird | 2.0.0.20 | |
| mozilla | thunderbird | 2.0.0.21 | |
| mozilla | thunderbird | 2.0.0.22 | |
| mozilla | thunderbird | 2.0.0.23 | |
| mozilla | thunderbird | 3.0 | |
| mozilla | thunderbird | 3.0.1 | |
| mozilla | thunderbird | 3.0.2 | |
| mozilla | thunderbird | 3.0.3 | |
| mozilla | thunderbird | 3.0.4 | |
| mozilla | thunderbird | 3.0.5 | |
| mozilla | thunderbird | 3.0.6 | |
| mozilla | thunderbird | 3.0.7 | |
| mozilla | thunderbird | 3.0.8 | |
| mozilla | thunderbird | 3.0.9 | |
| mozilla | thunderbird | 3.0.10 | |
| mozilla | thunderbird | 3.0.11 | |
| mozilla | thunderbird | 3.1 | |
| mozilla | thunderbird | 3.1.1 | |
| mozilla | thunderbird | 3.1.2 | |
| mozilla | thunderbird | 3.1.3 | |
| mozilla | thunderbird | 3.1.4 | |
| mozilla | thunderbird | 3.1.10 | |
| mozilla | thunderbird | 3.1.11 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9915D7D8-64F6-448C-A128-63D0352312CE",
"versionEndIncluding": "3.6.23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7AA88B-638A-451A-B235-A1A1444BE417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C01AD7C-8470-47AB-B8AE-670E3A381E89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7E43F2F1-9252-4B44-8A61-D05305915A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB9D48B-DC7B-4D92-BB26-B6DE629A2506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A360D595-A829-4DDE-932E-9995626917E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E9B5349-FAA7-4CDA-9533-1AD1ACDFAC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "07243837-C353-4C25-A5B1-4DA32807E97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B832C034-F793-415F-BFC8-D97A18BA6BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83CD1A13-66CB-49CC-BD84-5D8334DB774A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "93C142C5-3A85-432B-80D6-2E7B1B4694F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2434FCE7-A50B-4527-9970-C7224B31141C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"matchCriteriaId": "5633FB6E-D623-49D4-9858-4E20E64DE458",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "429ECA02-DBCD-45FB-942C-CA4BC1BC8A72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "567FF916-7DE0-403C-8528-7931A43E0D18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "010B34F4-910E-4515-990B-8E72DF009578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"matchCriteriaId": "438AACF8-006F-4522-853F-30DBBABD8C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "778FAE0C-A5CF-4B67-93A9-1A803E3E699F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7447185-7509-449D-8907-F30A42CF7EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDBAC37-9D08-44D1-B279-BC6ACF126CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3FFF89FA-2020-43CC-BACD-D66117B3DD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "834BB391-5EB5-43A8-980A-D305EDAE6FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9A38AD88-BAA6-4FBE-885B-69E951BD1EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B500EE6C-99DB-49A3-A1F1-AFFD7FE28068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2938F2-A801-45E5-8E06-BE03DE03C8A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F18A45C0-419C-4723-AB7D-5880EF668CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB88E86-6E83-4A59-9266-8B98AA91774D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"matchCriteriaId": "66BE50FE-EA21-4633-A181-CD35196DF06E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6BF5B1-86D1-47FE-9D9C-735718F94874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "84D15CE0-69DF-4EFD-801E-96A4D6AABEDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F38886-C25A-4C6B-93E7-36461405BA99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C65D2670-F37F-48CB-804A-D35BB1C27D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8E5194-7B34-4802-BDA6-6A86EB5EDE05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2917BD67-CE81-4B94-B241-D4A9DDA60319",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A524A94E-F19B-42B9-AA8E-171751C339AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F71436CF-F756-44E0-8E69-6951F6B3E54A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "582EE839-B83F-4908-9780-D0C92DC44FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "824369CF-00A0-434E-94BC-71CA1317012C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB35099-B04E-4796-A25D-953329FE62F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DBEBCFD-80D6-466A-BAEF-C75E65A3B12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C30ACBCA-4FA1-46DE-8F15-4830BC27E160",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9453EF65-7C69-449E-BF7C-4FECFB56713E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA75825-21CF-475B-8040-126A13FA2216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CA97C80E-17FA-4866-86CE-29886145ED80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE24BED-202E-416D-B5F2-8207D97B9939",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "04198E04-CE1D-4A5A-A20C-D1E135B45F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "717DB967-F658-4699-A224-5B261BFEC10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3487FA64-BE04-42CA-861E-3DAC097D7D32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D956DC-C73B-439F-8D79-8239207CC76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "57E2C7E7-56C0-466C-BB08-5EB43922C4F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "462E135A-5616-46CC-A9C0-5A7A0526ACC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6121F9C1-F4DF-4AAB-9E51-AC1592AA5639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "58D44634-A0B5-4F05-8983-B08D392EC742",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EB3AC3D3-FDD7-489F-BDCF-BDB55DF33A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4105171B-9C90-4ABF-B220-A35E7BA9EE40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "20985549-DB24-4B69-9D40-208A47AE658E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "43A13026-416F-4308-8A1B-E989BD769E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "612B015E-9F96-4CE6-83E4-23848FD609E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1E391619-0967-43E1-8CBC-4D54F72A85C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0544D626-E269-4677-9B05-7DAB23BD103B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C95F7B2C-80FC-4DF2-9680-F74634DCE3E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "863C140E-DC15-4A88-AB8A-8AEF9F4B8164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "38CD049A-5333-4FF7-AD34-6B74E19BADCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0066576D-D66A-4B59-B5C3-471EEBEE8B9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "60ED6DAA-9194-4829-BC1A-00F04BE7930A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "13BEB9A6-EFD5-4793-9603-84DB84F1CF7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "461163C6-4CA8-4BA9-95A1-136E612CBA6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "275E9D96-1290-44AB-BF9B-E9E4A803F593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "412DF091-7604-4110-87A0-3488116A97E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11E07FED-ABDB-4B0A-AB2E-4CBF1EAC4301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6558F1-9E0D-4107-909A-8EF4BC8A9C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "63DF3D65-C992-44CF-89B4-893526C6242E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9024117-2E8B-4240-9E21-CC501F3879B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC3CAD3-2F54-4E32-A0C9-0D826C45AC23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "52624B41-AB34-40AD-8709-D9646B618AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "917E9856-9556-4FD6-A834-858F8837A6B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "98BBD74D-930C-4D80-A91B-0D61347BAA63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF2E696-883D-4DE5-8B79-D8E5D9470253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94E04FD9-38E8-462D-82C2-729F7F7F0465",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5888517E-3C57-4A0A-9895-EA4BCB0A0ED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB21291-B9F3-445E-A9E9-EA1822083DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D595F649-ECBE-45E0-8AAD-BCBC65A654B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4FE6E920-9A4C-431B-89EA-683A22F15ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "18B6CC9F-6295-4598-B28B-0CA19D1D9F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F0434D-C84F-49FD-9F44-66D3ACD7B601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AAB416-E865-4EEE-8FCB-A91253BEB52B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "76CD3BDF-A079-4EF3-ABDE-43CBDD08DB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "031E8624-5161-43AF-AF19-6BAB5A94FDD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54186D4A-C6F0-44AD-94FB-73B4346ABB6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47E50AD9-BA35-4817-BD4D-5D678FC5A3C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DD09DE40-8C9B-41EA-B372-9E4E4830E8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F223FB83-0EDB-4429-94B9-1AEEF314B73F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6B977F-292F-4981-95A0-6065A3C487D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "342226B9-2C0C-416C-81FE-19C49F03AA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6A28E0-F67A-4275-B0D9-A02822E9EF7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ECAB4696-76F3-458C-B33B-D7F8690C60A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "BBB444FD-15F3-4447-9EA8-1669779A5749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F92E2EF3-A612-476F-9D31-1EEC240C7EA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0F175D30-2416-4172-BF11-DA78D252D608",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5DD3F168-3EF4-492E-BBAA-EACB1357C709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4B46BA97-2860-45E4-9FD3-F418A202E4F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C23289-38C3-4C62-8B27-249EAECC297E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F3782354-7EB7-49D2-B240-1871F6CB84C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30D47263-03AD-4060-91E3-90F997B3D174",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD775DF-277E-4D5B-B980-B8E6E782467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C8587BFD-417D-42BE-A5F8-22FDC68FA9E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7364FAB-EEE9-4064-A8AD-6547239F9AB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4C50485F-BC7B-4B70-A47B-1712E2DBAC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "51EE386B-0833-484E-A2AB-86B4470D4D45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EF1B4D-6556-4B3C-BDD0-6348A4D4A91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "68C5C7CF-005B-42FC-B950-90303F0CC115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0B2FA2CF-7FE4-43B1-96A0-C14666EDBD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "30290F6D-55CA-47EB-8F41-7BBB745C7A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F61F0607-14B0-49AD-B7E6-C4D75401C270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7FED863D-2898-4148-A9FB-73BFF9DE4396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "779C1245-A6F9-41F5-B8D4-FAE506A23FD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9E7CFEE9-70D4-465F-9FB9-397E6B200FA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "197E56BF-BE78-459F-A124-786DF39D1235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "07747612-3890-4271-94A4-4347E5ED073D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "0855BA85-BC52-4EDF-915A-8B4E5FB48092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BC273819-9DDE-4591-9376-1DD5782461F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9B68D1E7-B2F7-4581-8173-8CCF55A0E1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "CDFF6453-B707-4772-8CDF-2F8922FD4894",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51FE9002-8ED0-4BA0-9181-1739A535A3AE",
"versionEndIncluding": "3.1.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0618BD26-0EF5-4774-9131-B5ABD4CD302A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0D604DAE-DF63-413C-9F49-FFC8E84699F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11DE6185-09F4-48E3-9742-F9D8030B5774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B2E70864-E077-4CD6-A0E8-BC2C4C298A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61E565E5-286D-4A68-B085-5659DFE59A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2A68B4-9101-4AC5-9E82-EEB5A5405541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA6C390-9BA7-4355-8C0A-CD68FF6AC236",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C75B125-E5BB-49A0-B12D-6CF40D8A5DB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70DDB53E-7A12-4A08-8999-DB68E6DF901E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6514EDE8-7C78-4C72-A313-E0915D89E4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5263F879-9B90-4582-B677-F133DEBE5259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C256B73C-9ABC-43D4-8C57-09161BC9F923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "055D1044-9FC5-45AA-8407-649E96C5AFE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1C87A5-C14D-4A23-B865-3BB1FCDC8470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C4DB0BB-BFD7-4E7A-B3EF-9C5422602216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D56153-E20A-46D8-859E-A51E5C03D674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2C51A6F4-F88F-4BF2-BF71-5DC48559C085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC390CB-774C-47BE-95C3-059943A9E645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "379F6A73-B45F-4094-8167-4E929FFB1749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B71DE7AC-553B-4524-8B33-5605518449EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72B02389-0DCD-45BC-A09F-CB6B75940616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "41AE4644-2D23-43EA-ABDA-7BE60EFD1EFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4FB87608-0DF8-4729-95C5-CFA386AB3AC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"matchCriteriaId": "1A406214-29E5-4E13-B2E1-1CF72F1E60BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C169DA-26BC-42EE-817B-2F0685069495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C99BAF7-B48E-4402-B2BF-EB07235E402E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F0C73F-291F-4A92-87B8-2269B5C1516D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C86FD617-E4FE-4F85-AAA4-4F968A9DEC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "938B1260-74A7-4CFF-8086-415DCC284430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E28672BA-E3C2-40C3-80E1-95B7CDD089E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9308147C-0A23-48BC-BFA9-A49B9D73014E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E6654EC3-BED6-4D6D-9B7F-DF4CC8E464BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CAD8DCC-DBB4-40EE-927C-7B0969700077",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "77F9CE47-E3AA-49D7-AEC9-447951AC31E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "581615BB-C781-42CA-836E-0E0EAB8C4504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "257F43FA-D22C-4BF0-A02E-261A54142BCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8D63F5-78D5-4F7B-B15A-2C15FC405E27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "84BC6D68-4ED4-43CF-A2EB-47BD15D11AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D291234-D64A-4E8A-A7CD-08BB980E1CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB1FC6D1-8D93-4D87-9D73-7C6C0F8D45C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A3C27EC-5794-49C1-96E0-997E700B13DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97BDCEEC-25FE-4763-AC63-BA6B4F25E0C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC60781-766B-4B9C-B68D-45D51C5E5D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "745C2CBA-4824-441B-A6BC-E80959C2E035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C6A7D00-A203-4891-96CE-20C91FCBF048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8CB480-0595-4BC1-998E-3638E85DB367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC7EAB8D-CA40-4C29-99DF-24FF1753BCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9218A9-DA27-436A-AC93-F465FC14ECF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E66503D7-72CB-42A5-8C85-D9579EF2C0A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD7D204-3EBA-4D9E-B95A-86524B4C03D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBF526-7A28-436B-9B01-EADE913602B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B373B409-0939-4707-99F1-95B121BFF7FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "75A0BCE3-38E7-4318-9A7E-3D895171129A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E80CA1DE-B920-4E28-BEFC-574148D19A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2303104C-4A91-4704-A9CB-8C83A859090E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCDAA51-4AA3-4EC4-B441-71FB3C3304F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "04CA7AD2-79BA-4A73-ADAB-E3BCA3FD7F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D54ACD07-FAB7-4513-A707-18FAF7D565C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "7260CE1F-501D-44FF-A3FA-2137CA01733B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "55D3DD1B-64DF-46C8-80A3-99D2E34B665F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF479C3-95A0-414F-B47B-C94BE95713D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "48702EEB-C272-46ED-9C61-6F44D6964DDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "AC650D89-CEEC-4A90-B3B9-5F0ADCEFCBB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8C0115-94B1-4046-A599-E92DCFB936F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "4033E532-7298-40DF-A582-22B7106035C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE19E377-CB55-4784-A003-5335D531AAF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF605F6-2A84-4DE5-AB62-282E9C46479B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "08F10B5E-0780-4756-919C-B0C00C673412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6D930F0F-DCC3-4905-A4B1-288F0CCC6975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA0F9D4-B68A-4018-BC4E-95B87A1A8489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61CCB291-B71B-40D3-8493-215003851BDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD1FE7A-B888-461D-93F3-B71C94B4AA56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E2727C9C-618D-4AEF-B7BE-8BE5935483F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "95B21CE4-AF78-4D1B-A73E-84E83DB4A2C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "48F3528F-4E43-4D91-957E-49C7DB2A135A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7706B2-D0F0-4E37-B9B5-8DA72413382B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2BEE78E5-D163-4764-B3BB-5BE270549F5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58FC2EFB-CE85-4A65-A7B4-A0779F11B5BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27B9EA91-A461-42CE-9ED7-3805BD13A4B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C48E432-8945-4918-B2A4-AD2E05A51633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2A95B301-A72B-4F95-A7D6-4B574E9D3BDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "968C261F-A7D5-4EB6-BCFF-EE40DB5A11D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A115A0-D887-491D-99F6-8D5B47771760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1AB4C2C3-A535-4B87-90DC-44549555A452",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004."
},
{
"lang": "es",
"value": "El \u0027JSSubScriptLoader\u0027 en Mozilla Firefox antes de v3.6.24 y Thunderbird antes de v3.1.6 no maneja adecuadamente \u0027XPCNativeWrappers\u0027 durante las llamadas al m\u00e9todo loadSubScript en un complemento, lo que permite ganar privilegios a los atacantes remotos a trav\u00e9s de un sitio web espec\u00edficamente dise\u00f1ado que aprovecha cierto el comportamiento de \u0027unwrapping\u0027. Se trata de un problema relacionado con CVE-2011-3004."
}
],
"id": "CVE-2011-3647",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-11-09T11:55:03.520",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-46.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=680880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13550"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.