Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-3977 (GCVE-0-2012-3977)
Vulnerability from cvelistv5 – Published: 2012-10-09 10:00 – Updated: 2013-11-02 09:00DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2013-11-02T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-3977",
"datePublished": "2012-10-09T10:00:00",
"dateRejected": "2013-11-02T09:00:00",
"dateReserved": "2012-07-11T00:00:00",
"dateUpdated": "2013-11-02T09:00:00",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage\"}]",
"id": "CVE-2012-3977",
"lastModified": "2023-11-07T02:11:41.997",
"published": "2012-10-09T11:13:09.690",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Rejected"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-3977\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-10-09T11:13:09.690\",\"lastModified\":\"2023-11-07T02:11:41.997\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage\"}],\"metrics\":{},\"references\":[]}}"
}
}
GSD-2012-3977
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-3977",
"description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2012-3977",
"references": [
"https://www.suse.com/security/cve/CVE-2012-3977.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-3977"
],
"details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2012-3977",
"modified": "2023-12-13T01:20:20.624812Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3977",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}
}
CERTA-2012-AVI-561
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Mozilla. La majorité d'entre elles sont considérées comme « Critiques » par l'éditeur. Parmi elles plusieurs utilisations de données après libération (use-after-free) sont présentes et peuvent mener à des exécutions de codes arbitraires à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Mozilla Firefox ESR 10.0.9 | ||
| Mozilla | Thunderbird | Mozilla Thunderbird 16.0.1 | ||
| Mozilla | Firefox | Mozilla Firefox 16.0.1 | ||
| Mozilla | Thunderbird | Mozilla Thunderbird ESR 10.0.9 | ||
| Mozilla | N/A | Mozilla SeaMonkey 2.13.1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Firefox ESR 10.0.9",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Thunderbird 16.0.1",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Firefox 16.0.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Thunderbird ESR 10.0.9",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla SeaMonkey 2.13.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-4184",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4184"
},
{
"name": "CVE-2012-4183",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4183"
},
{
"name": "CVE-2012-4179",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4179"
},
{
"name": "CVE-2012-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4181"
},
{
"name": "CVE-2012-4188",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4188"
},
{
"name": "CVE-2012-3985",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3985"
},
{
"name": "CVE-2012-3992",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3992"
},
{
"name": "CVE-2012-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4193"
},
{
"name": "CVE-2012-4185",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4185"
},
{
"name": "CVE-2012-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3995"
},
{
"name": "CVE-2012-4192",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4192"
},
{
"name": "CVE-2012-3994",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3994"
},
{
"name": "CVE-2012-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4187"
},
{
"name": "CVE-2012-3984",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3984"
},
{
"name": "CVE-2012-3982",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3982"
},
{
"name": "CVE-2012-4190",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4190"
},
{
"name": "CVE-2012-3989",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3989"
},
{
"name": "CVE-2012-3977",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3977"
},
{
"name": "CVE-2012-4191",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4191"
},
{
"name": "CVE-2012-4182",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4182"
},
{
"name": "CVE-2012-4186",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4186"
},
{
"name": "CVE-2012-3988",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3988"
},
{
"name": "CVE-2012-3987",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3987"
},
{
"name": "CVE-2012-3986",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3986"
},
{
"name": "CVE-2012-3993",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3993"
},
{
"name": "CVE-2012-3991",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3991"
},
{
"name": "CVE-2012-3983",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3983"
},
{
"name": "CVE-2012-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4180"
},
{
"name": "CVE-2012-3990",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3990"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-84 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-84.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-87 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-87.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-81 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-82.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-83 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-83.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-78 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-78.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-74 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-74.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-77 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-77.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-85 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-85.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-79 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-79.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-80 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-80.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2012/mfsa2012-73 du 21 septembre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-73.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-75 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-75.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-88 du 11 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-88.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-86 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-89 du 11 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-89.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-76 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-76.html"
}
],
"reference": "CERTA-2012-AVI-561",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2012-10-10T00:00:00.000000"
},
{
"description": "ajout de deux bulletins.",
"revision_date": "2012-10-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eMozilla\u003c/span\u003e. La majorit\u00e9 d\u0027entre elles sont\nconsid\u00e9r\u00e9es comme \u00ab Critiques \u00bb par l\u0027\u00e9diteur. Parmi elles plusieurs\nutilisations de donn\u00e9es apr\u00e8s lib\u00e9ration (use-after-free) sont pr\u00e9sentes\net peuvent mener \u00e0 des ex\u00e9cutions de codes arbitraires \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Mozilla MFSA2012-73 \u00e0 MFSA2012-87",
"url": null
}
]
}
CERTA-2012-AVI-561
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Mozilla. La majorité d'entre elles sont considérées comme « Critiques » par l'éditeur. Parmi elles plusieurs utilisations de données après libération (use-after-free) sont présentes et peuvent mener à des exécutions de codes arbitraires à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Mozilla Firefox ESR 10.0.9 | ||
| Mozilla | Thunderbird | Mozilla Thunderbird 16.0.1 | ||
| Mozilla | Firefox | Mozilla Firefox 16.0.1 | ||
| Mozilla | Thunderbird | Mozilla Thunderbird ESR 10.0.9 | ||
| Mozilla | N/A | Mozilla SeaMonkey 2.13.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Firefox ESR 10.0.9",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Thunderbird 16.0.1",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Firefox 16.0.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Thunderbird ESR 10.0.9",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla SeaMonkey 2.13.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-4184",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4184"
},
{
"name": "CVE-2012-4183",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4183"
},
{
"name": "CVE-2012-4179",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4179"
},
{
"name": "CVE-2012-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4181"
},
{
"name": "CVE-2012-4188",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4188"
},
{
"name": "CVE-2012-3985",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3985"
},
{
"name": "CVE-2012-3992",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3992"
},
{
"name": "CVE-2012-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4193"
},
{
"name": "CVE-2012-4185",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4185"
},
{
"name": "CVE-2012-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3995"
},
{
"name": "CVE-2012-4192",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4192"
},
{
"name": "CVE-2012-3994",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3994"
},
{
"name": "CVE-2012-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4187"
},
{
"name": "CVE-2012-3984",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3984"
},
{
"name": "CVE-2012-3982",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3982"
},
{
"name": "CVE-2012-4190",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4190"
},
{
"name": "CVE-2012-3989",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3989"
},
{
"name": "CVE-2012-3977",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3977"
},
{
"name": "CVE-2012-4191",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4191"
},
{
"name": "CVE-2012-4182",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4182"
},
{
"name": "CVE-2012-4186",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4186"
},
{
"name": "CVE-2012-3988",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3988"
},
{
"name": "CVE-2012-3987",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3987"
},
{
"name": "CVE-2012-3986",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3986"
},
{
"name": "CVE-2012-3993",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3993"
},
{
"name": "CVE-2012-3991",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3991"
},
{
"name": "CVE-2012-3983",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3983"
},
{
"name": "CVE-2012-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4180"
},
{
"name": "CVE-2012-3990",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3990"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-84 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-84.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-87 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-87.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-81 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-82.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-83 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-83.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-78 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-78.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-74 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-74.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-77 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-77.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-85 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-85.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-79 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-79.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-80 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-80.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2012/mfsa2012-73 du 21 septembre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-73.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-75 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-75.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-88 du 11 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-88.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-86 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-89 du 11 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-89.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-76 du 09 octobre 2012 :",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-76.html"
}
],
"reference": "CERTA-2012-AVI-561",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2012-10-10T00:00:00.000000"
},
{
"description": "ajout de deux bulletins.",
"revision_date": "2012-10-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eMozilla\u003c/span\u003e. La majorit\u00e9 d\u0027entre elles sont\nconsid\u00e9r\u00e9es comme \u00ab Critiques \u00bb par l\u0027\u00e9diteur. Parmi elles plusieurs\nutilisations de donn\u00e9es apr\u00e8s lib\u00e9ration (use-after-free) sont pr\u00e9sentes\net peuvent mener \u00e0 des ex\u00e9cutions de codes arbitraires \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Mozilla MFSA2012-73 \u00e0 MFSA2012-87",
"url": null
}
]
}
FKIE_CVE-2012-3977
Vulnerability from fkie_nvd - Published: 2012-10-09 11:13 - Updated: 2023-11-07 02:11| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
],
"id": "CVE-2012-3977",
"lastModified": "2023-11-07T02:11:41.997",
"metrics": {},
"published": "2012-10-09T11:13:09.690",
"references": [],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Rejected"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.