Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@2.14.0
Typemozilla
Namespace
NameSeaMonkey
Version2.14.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.15.0
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4sy6-hed7-nkfz
vulnerability_id VCID-4sy6-hed7-nkfz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4205.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4205.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4205
reference_id
reference_type
scores
0
value 0.00795
scoring_system epss
scoring_elements 0.74049
published_at 2026-04-24T12:55:00Z
1
value 0.00795
scoring_system epss
scoring_elements 0.73924
published_at 2026-04-01T12:55:00Z
2
value 0.00795
scoring_system epss
scoring_elements 0.74016
published_at 2026-04-21T12:55:00Z
3
value 0.00795
scoring_system epss
scoring_elements 0.74025
published_at 2026-04-18T12:55:00Z
4
value 0.00795
scoring_system epss
scoring_elements 0.73934
published_at 2026-04-02T12:55:00Z
5
value 0.00795
scoring_system epss
scoring_elements 0.73959
published_at 2026-04-04T12:55:00Z
6
value 0.00795
scoring_system epss
scoring_elements 0.73931
published_at 2026-04-07T12:55:00Z
7
value 0.00795
scoring_system epss
scoring_elements 0.73965
published_at 2026-04-08T12:55:00Z
8
value 0.00795
scoring_system epss
scoring_elements 0.73978
published_at 2026-04-09T12:55:00Z
9
value 0.00795
scoring_system epss
scoring_elements 0.74001
published_at 2026-04-11T12:55:00Z
10
value 0.00795
scoring_system epss
scoring_elements 0.73983
published_at 2026-04-12T12:55:00Z
11
value 0.00795
scoring_system epss
scoring_elements 0.73975
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4205
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=779821
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=779821
8
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
9
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
10
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
11
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
12
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
13
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80175
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80175
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16965
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16965
16
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-97.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-97.html
17
reference_url http://www.securityfocus.com/bid/56621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56621
18
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
19
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
20
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
21
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877625
reference_id 877625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877625
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205
reference_id CVE-2012-4205
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4205
reference_id CVE-2012-4205
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4205
42
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-97
reference_id mfsa2012-97
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-97
44
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
45
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-4205
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4sy6-hed7-nkfz
1
url VCID-azav-xevg-a3f1
vulnerability_id VCID-azav-xevg-a3f1
summary
Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting five additional use-after-free, out of bounds read, and buffer overflow flaws introduced during Firefox development that were fixed before general release. 
In general these flaws cannot be exploited through email in the
Thunderbird and SeaMonkey products because scripting is disabled, but are
potentially a risk in browser or browser-like contexts in those products.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2012-1482.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1482.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1483.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1483.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4214.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4214.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4214
reference_id
reference_type
scores
0
value 0.02337
scoring_system epss
scoring_elements 0.84897
published_at 2026-04-24T12:55:00Z
1
value 0.02337
scoring_system epss
scoring_elements 0.84777
published_at 2026-04-01T12:55:00Z
2
value 0.02337
scoring_system epss
scoring_elements 0.84873
published_at 2026-04-18T12:55:00Z
3
value 0.02337
scoring_system epss
scoring_elements 0.84871
published_at 2026-04-21T12:55:00Z
4
value 0.02337
scoring_system epss
scoring_elements 0.84792
published_at 2026-04-02T12:55:00Z
5
value 0.02337
scoring_system epss
scoring_elements 0.84811
published_at 2026-04-04T12:55:00Z
6
value 0.02337
scoring_system epss
scoring_elements 0.84813
published_at 2026-04-07T12:55:00Z
7
value 0.02337
scoring_system epss
scoring_elements 0.84835
published_at 2026-04-08T12:55:00Z
8
value 0.02337
scoring_system epss
scoring_elements 0.84842
published_at 2026-04-09T12:55:00Z
9
value 0.02337
scoring_system epss
scoring_elements 0.8486
published_at 2026-04-11T12:55:00Z
10
value 0.02337
scoring_system epss
scoring_elements 0.84857
published_at 2026-04-12T12:55:00Z
11
value 0.02337
scoring_system epss
scoring_elements 0.84851
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4214
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=795804
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=795804
10
reference_url http://secunia.com/advisories/51359
reference_id
reference_type
scores
url http://secunia.com/advisories/51359
11
reference_url http://secunia.com/advisories/51360
reference_id
reference_type
scores
url http://secunia.com/advisories/51360
12
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
13
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
14
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
15
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
16
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
17
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80187
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80187
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16884
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16884
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
21
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
22
reference_url http://www.palemoon.org/releasenotes-ng.shtml
reference_id
reference_type
scores
url http://www.palemoon.org/releasenotes-ng.shtml
23
reference_url http://www.securityfocus.com/bid/56628
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56628
24
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
25
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
26
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
27
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877634
reference_id 877634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877634
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214
reference_id CVE-2012-4214
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4214
reference_id CVE-2012-4214
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-4214
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-105
reference_id mfsa2012-105
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-105
57
reference_url https://access.redhat.com/errata/RHSA-2012:1482
reference_id RHSA-2012:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1482
58
reference_url https://access.redhat.com/errata/RHSA-2012:1483
reference_id RHSA-2012:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1483
59
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
60
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-4214
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azav-xevg-a3f1
2
url VCID-fwa9-k9ug-ffdg
vulnerability_id VCID-fwa9-k9ug-ffdg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://osvdb.org/87594
reference_id
reference_type
scores
url http://osvdb.org/87594
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1482.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1482.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2012-1483.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1483.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4201.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4201.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4201
reference_id
reference_type
scores
0
value 0.01959
scoring_system epss
scoring_elements 0.83558
published_at 2026-04-24T12:55:00Z
1
value 0.01959
scoring_system epss
scoring_elements 0.83433
published_at 2026-04-01T12:55:00Z
2
value 0.01959
scoring_system epss
scoring_elements 0.83532
published_at 2026-04-16T12:55:00Z
3
value 0.01959
scoring_system epss
scoring_elements 0.83534
published_at 2026-04-21T12:55:00Z
4
value 0.01959
scoring_system epss
scoring_elements 0.83446
published_at 2026-04-02T12:55:00Z
5
value 0.01959
scoring_system epss
scoring_elements 0.8346
published_at 2026-04-04T12:55:00Z
6
value 0.01959
scoring_system epss
scoring_elements 0.83459
published_at 2026-04-07T12:55:00Z
7
value 0.01959
scoring_system epss
scoring_elements 0.83483
published_at 2026-04-08T12:55:00Z
8
value 0.01959
scoring_system epss
scoring_elements 0.83493
published_at 2026-04-09T12:55:00Z
9
value 0.01959
scoring_system epss
scoring_elements 0.83507
published_at 2026-04-11T12:55:00Z
10
value 0.01959
scoring_system epss
scoring_elements 0.83501
published_at 2026-04-12T12:55:00Z
11
value 0.01959
scoring_system epss
scoring_elements 0.83497
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4201
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=747607
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=747607
11
reference_url http://secunia.com/advisories/51359
reference_id
reference_type
scores
url http://secunia.com/advisories/51359
12
reference_url http://secunia.com/advisories/51360
reference_id
reference_type
scores
url http://secunia.com/advisories/51360
13
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
14
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
15
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
16
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
17
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
18
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80171
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80171
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15995
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15995
21
reference_url http://www.debian.org/security/2012/dsa-2583
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2583
22
reference_url http://www.debian.org/security/2012/dsa-2584
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2584
23
reference_url http://www.debian.org/security/2012/dsa-2588
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2588
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
25
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-93.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-93.html
26
reference_url http://www.securityfocus.com/bid/56618
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56618
27
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
28
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
29
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
30
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877616
reference_id 877616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877616
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201
reference_id CVE-2012-4201
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4201
reference_id CVE-2012-4201
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4201
61
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
62
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-93
reference_id mfsa2012-93
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-93
63
reference_url https://access.redhat.com/errata/RHSA-2012:1482
reference_id RHSA-2012:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1482
64
reference_url https://access.redhat.com/errata/RHSA-2012:1483
reference_id RHSA-2012:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1483
65
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
66
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-4201
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwa9-k9ug-ffdg
3
url VCID-p9t8-9m9m-rbg5
vulnerability_id VCID-p9t8-9m9m-rbg5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://osvdb.org/87588
reference_id
reference_type
scores
url http://osvdb.org/87588
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1482.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1482.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2012-1483.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1483.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5841.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5841.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5841
reference_id
reference_type
scores
0
value 0.0091
scoring_system epss
scoring_elements 0.75873
published_at 2026-04-24T12:55:00Z
1
value 0.0091
scoring_system epss
scoring_elements 0.75752
published_at 2026-04-01T12:55:00Z
2
value 0.0091
scoring_system epss
scoring_elements 0.7585
published_at 2026-04-18T12:55:00Z
3
value 0.0091
scoring_system epss
scoring_elements 0.75835
published_at 2026-04-21T12:55:00Z
4
value 0.0091
scoring_system epss
scoring_elements 0.75755
published_at 2026-04-02T12:55:00Z
5
value 0.0091
scoring_system epss
scoring_elements 0.75787
published_at 2026-04-04T12:55:00Z
6
value 0.0091
scoring_system epss
scoring_elements 0.75765
published_at 2026-04-07T12:55:00Z
7
value 0.0091
scoring_system epss
scoring_elements 0.75799
published_at 2026-04-08T12:55:00Z
8
value 0.0091
scoring_system epss
scoring_elements 0.7581
published_at 2026-04-09T12:55:00Z
9
value 0.0091
scoring_system epss
scoring_elements 0.75834
published_at 2026-04-11T12:55:00Z
10
value 0.0091
scoring_system epss
scoring_elements 0.75815
published_at 2026-04-12T12:55:00Z
11
value 0.0091
scoring_system epss
scoring_elements 0.75809
published_at 2026-04-13T12:55:00Z
12
value 0.0091
scoring_system epss
scoring_elements 0.75846
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5841
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=805807
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=805807
11
reference_url http://secunia.com/advisories/51359
reference_id
reference_type
scores
url http://secunia.com/advisories/51359
12
reference_url http://secunia.com/advisories/51360
reference_id
reference_type
scores
url http://secunia.com/advisories/51360
13
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
14
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
15
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
16
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
17
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
18
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80178
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80178
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16590
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16590
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
22
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-100.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-100.html
23
reference_url http://www.securityfocus.com/bid/56631
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56631
24
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
25
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
26
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
27
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877628
reference_id 877628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877628
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841
reference_id CVE-2012-5841
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5841
reference_id CVE-2012-5841
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-5841
56
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-100
reference_id mfsa2012-100
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-100
58
reference_url https://access.redhat.com/errata/RHSA-2012:1482
reference_id RHSA-2012:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1482
59
reference_url https://access.redhat.com/errata/RHSA-2012:1483
reference_id RHSA-2012:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1483
60
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
61
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-5841
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9t8-9m9m-rbg5
4
url VCID-qxjr-9644-e7h1
vulnerability_id VCID-qxjr-9644-e7h1
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://osvdb.org/87598
reference_id
reference_type
scores
url http://osvdb.org/87598
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1482.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1482.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2012-1483.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1483.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5830.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5830
reference_id
reference_type
scores
0
value 0.00861
scoring_system epss
scoring_elements 0.75123
published_at 2026-04-24T12:55:00Z
1
value 0.00861
scoring_system epss
scoring_elements 0.75006
published_at 2026-04-01T12:55:00Z
2
value 0.00861
scoring_system epss
scoring_elements 0.75087
published_at 2026-04-16T12:55:00Z
3
value 0.00861
scoring_system epss
scoring_elements 0.75095
published_at 2026-04-18T12:55:00Z
4
value 0.00861
scoring_system epss
scoring_elements 0.75085
published_at 2026-04-21T12:55:00Z
5
value 0.00861
scoring_system epss
scoring_elements 0.75008
published_at 2026-04-02T12:55:00Z
6
value 0.00861
scoring_system epss
scoring_elements 0.75037
published_at 2026-04-04T12:55:00Z
7
value 0.00861
scoring_system epss
scoring_elements 0.75013
published_at 2026-04-07T12:55:00Z
8
value 0.00861
scoring_system epss
scoring_elements 0.75047
published_at 2026-04-08T12:55:00Z
9
value 0.00861
scoring_system epss
scoring_elements 0.75059
published_at 2026-04-09T12:55:00Z
10
value 0.00861
scoring_system epss
scoring_elements 0.75081
published_at 2026-04-11T12:55:00Z
11
value 0.00861
scoring_system epss
scoring_elements 0.7506
published_at 2026-04-12T12:55:00Z
12
value 0.00861
scoring_system epss
scoring_elements 0.7505
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5830
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=775228
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=775228
11
reference_url http://secunia.com/advisories/51359
reference_id
reference_type
scores
url http://secunia.com/advisories/51359
12
reference_url http://secunia.com/advisories/51360
reference_id
reference_type
scores
url http://secunia.com/advisories/51360
13
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
14
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
15
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
16
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
17
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
18
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80183
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80183
20
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-106.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-106.html
21
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
22
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
23
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
24
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877635
reference_id 877635
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877635
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp2:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:-:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830
reference_id CVE-2012-5830
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5830
reference_id CVE-2012-5830
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2012-5830
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-106
reference_id mfsa2012-106
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-106
57
reference_url https://access.redhat.com/errata/RHSA-2012:1482
reference_id RHSA-2012:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1482
58
reference_url https://access.redhat.com/errata/RHSA-2012:1483
reference_id RHSA-2012:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1483
59
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
60
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-5830
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qxjr-9644-e7h1
5
url VCID-rfff-uvmz-xbe4
vulnerability_id VCID-rfff-uvmz-xbe4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://osvdb.org/87593
reference_id
reference_type
scores
url http://osvdb.org/87593
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5836.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5836.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5836
reference_id
reference_type
scores
0
value 0.01381
scoring_system epss
scoring_elements 0.80339
published_at 2026-04-24T12:55:00Z
1
value 0.01381
scoring_system epss
scoring_elements 0.80226
published_at 2026-04-01T12:55:00Z
2
value 0.01381
scoring_system epss
scoring_elements 0.80309
published_at 2026-04-18T12:55:00Z
3
value 0.01381
scoring_system epss
scoring_elements 0.80313
published_at 2026-04-21T12:55:00Z
4
value 0.01381
scoring_system epss
scoring_elements 0.80234
published_at 2026-04-02T12:55:00Z
5
value 0.01381
scoring_system epss
scoring_elements 0.80254
published_at 2026-04-04T12:55:00Z
6
value 0.01381
scoring_system epss
scoring_elements 0.80243
published_at 2026-04-07T12:55:00Z
7
value 0.01381
scoring_system epss
scoring_elements 0.8027
published_at 2026-04-08T12:55:00Z
8
value 0.01381
scoring_system epss
scoring_elements 0.8028
published_at 2026-04-09T12:55:00Z
9
value 0.01381
scoring_system epss
scoring_elements 0.80299
published_at 2026-04-11T12:55:00Z
10
value 0.01381
scoring_system epss
scoring_elements 0.80283
published_at 2026-04-12T12:55:00Z
11
value 0.01381
scoring_system epss
scoring_elements 0.80277
published_at 2026-04-13T12:55:00Z
12
value 0.01381
scoring_system epss
scoring_elements 0.80308
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5836
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=792857
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=792857
9
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
10
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
11
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
12
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
13
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
14
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80172
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80172
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16336
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16336
17
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-94.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-94.html
18
reference_url http://www.securityfocus.com/bid/56616
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56616
19
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
20
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
21
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
22
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877617
reference_id 877617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877617
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836
reference_id CVE-2012-5836
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5836
reference_id CVE-2012-5836
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5836
43
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
44
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-94
reference_id mfsa2012-94
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-94
45
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
46
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-5836
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfff-uvmz-xbe4
6
url VCID-rgkp-48gp-kfb8
vulnerability_id VCID-rgkp-48gp-kfb8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2012-1482.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1482.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1483.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1483.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4209.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4209.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4209
reference_id
reference_type
scores
0
value 0.02065
scoring_system epss
scoring_elements 0.83979
published_at 2026-04-24T12:55:00Z
1
value 0.02065
scoring_system epss
scoring_elements 0.83858
published_at 2026-04-01T12:55:00Z
2
value 0.02065
scoring_system epss
scoring_elements 0.83951
published_at 2026-04-18T12:55:00Z
3
value 0.02065
scoring_system epss
scoring_elements 0.83953
published_at 2026-04-21T12:55:00Z
4
value 0.02065
scoring_system epss
scoring_elements 0.83872
published_at 2026-04-02T12:55:00Z
5
value 0.02065
scoring_system epss
scoring_elements 0.83888
published_at 2026-04-04T12:55:00Z
6
value 0.02065
scoring_system epss
scoring_elements 0.83889
published_at 2026-04-07T12:55:00Z
7
value 0.02065
scoring_system epss
scoring_elements 0.83913
published_at 2026-04-08T12:55:00Z
8
value 0.02065
scoring_system epss
scoring_elements 0.83919
published_at 2026-04-09T12:55:00Z
9
value 0.02065
scoring_system epss
scoring_elements 0.83936
published_at 2026-04-11T12:55:00Z
10
value 0.02065
scoring_system epss
scoring_elements 0.8393
published_at 2026-04-12T12:55:00Z
11
value 0.02065
scoring_system epss
scoring_elements 0.83926
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4209
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=792405
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=792405
10
reference_url http://secunia.com/advisories/51359
reference_id
reference_type
scores
url http://secunia.com/advisories/51359
11
reference_url http://secunia.com/advisories/51360
reference_id
reference_type
scores
url http://secunia.com/advisories/51360
12
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
13
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
14
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
15
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
16
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
17
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80181
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80181
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16880
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16880
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
21
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-103.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-103.html
22
reference_url http://www.securityfocus.com/bid/56629
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56629
23
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
24
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
25
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
26
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877632
reference_id 877632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877632
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209
reference_id CVE-2012-4209
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4209
reference_id CVE-2012-4209
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4209
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-103
reference_id mfsa2012-103
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-103
57
reference_url https://access.redhat.com/errata/RHSA-2012:1482
reference_id RHSA-2012:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1482
58
reference_url https://access.redhat.com/errata/RHSA-2012:1483
reference_id RHSA-2012:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1483
59
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
60
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-4209
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgkp-48gp-kfb8
7
url VCID-s7av-yexd-qyhh
vulnerability_id VCID-s7av-yexd-qyhh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5843.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5843.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5843
reference_id
reference_type
scores
0
value 0.01532
scoring_system epss
scoring_elements 0.81382
published_at 2026-04-24T12:55:00Z
1
value 0.01532
scoring_system epss
scoring_elements 0.81257
published_at 2026-04-01T12:55:00Z
2
value 0.01532
scoring_system epss
scoring_elements 0.81357
published_at 2026-04-16T12:55:00Z
3
value 0.01532
scoring_system epss
scoring_elements 0.81359
published_at 2026-04-21T12:55:00Z
4
value 0.01532
scoring_system epss
scoring_elements 0.81266
published_at 2026-04-02T12:55:00Z
5
value 0.01532
scoring_system epss
scoring_elements 0.81288
published_at 2026-04-04T12:55:00Z
6
value 0.01532
scoring_system epss
scoring_elements 0.81287
published_at 2026-04-07T12:55:00Z
7
value 0.01532
scoring_system epss
scoring_elements 0.81316
published_at 2026-04-08T12:55:00Z
8
value 0.01532
scoring_system epss
scoring_elements 0.81321
published_at 2026-04-09T12:55:00Z
9
value 0.01532
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-11T12:55:00Z
10
value 0.01532
scoring_system epss
scoring_elements 0.81327
published_at 2026-04-12T12:55:00Z
11
value 0.01532
scoring_system epss
scoring_elements 0.8132
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5843
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=760887
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=760887
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=765409
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=765409
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=774953
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=774953
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=780778
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=780778
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=781859
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=781859
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=784404
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=784404
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=787089
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=787089
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=788822
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=788822
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=789075
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=789075
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=791601
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=791601
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=793253
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=793253
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=795281
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=795281
19
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=797163
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=797163
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=798678
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=798678
21
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
22
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
23
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
24
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
25
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
26
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16839
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16839
28
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-91.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-91.html
29
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
30
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
31
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
32
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877613
reference_id 877613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877613
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843
reference_id CVE-2012-5843
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5843
reference_id CVE-2012-5843
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5843
54
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-91
reference_id mfsa2012-91
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-91
56
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
57
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-5843
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s7av-yexd-qyhh
8
url VCID-vdxf-4twx-yyfe
vulnerability_id VCID-vdxf-4twx-yyfe
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4208.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4208.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4208
reference_id
reference_type
scores
0
value 0.00577
scoring_system epss
scoring_elements 0.68885
published_at 2026-04-24T12:55:00Z
1
value 0.00577
scoring_system epss
scoring_elements 0.68742
published_at 2026-04-01T12:55:00Z
2
value 0.00577
scoring_system epss
scoring_elements 0.6886
published_at 2026-04-18T12:55:00Z
3
value 0.00577
scoring_system epss
scoring_elements 0.68838
published_at 2026-04-21T12:55:00Z
4
value 0.00577
scoring_system epss
scoring_elements 0.68761
published_at 2026-04-02T12:55:00Z
5
value 0.00577
scoring_system epss
scoring_elements 0.68781
published_at 2026-04-04T12:55:00Z
6
value 0.00577
scoring_system epss
scoring_elements 0.68759
published_at 2026-04-07T12:55:00Z
7
value 0.00577
scoring_system epss
scoring_elements 0.68811
published_at 2026-04-08T12:55:00Z
8
value 0.00577
scoring_system epss
scoring_elements 0.6883
published_at 2026-04-09T12:55:00Z
9
value 0.00577
scoring_system epss
scoring_elements 0.68852
published_at 2026-04-11T12:55:00Z
10
value 0.00577
scoring_system epss
scoring_elements 0.68837
published_at 2026-04-12T12:55:00Z
11
value 0.00577
scoring_system epss
scoring_elements 0.68808
published_at 2026-04-13T12:55:00Z
12
value 0.00577
scoring_system epss
scoring_elements 0.6885
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4208
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=798264
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=798264
8
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
9
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
10
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
11
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
12
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
13
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16695
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16695
15
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-99.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-99.html
16
reference_url http://www.securityfocus.com/bid/56627
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56627
17
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
18
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
19
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
20
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877627
reference_id 877627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877627
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208
reference_id CVE-2012-4208
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4208
reference_id CVE-2012-4208
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4208
41
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-99
reference_id mfsa2012-99
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-99
43
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
44
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-4208
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdxf-4twx-yyfe
9
url VCID-vvn3-2xv4-jycs
vulnerability_id VCID-vvn3-2xv4-jycs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://osvdb.org/87592
reference_id
reference_type
scores
url http://osvdb.org/87592
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4204.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4204.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4204
reference_id
reference_type
scores
0
value 0.02253
scoring_system epss
scoring_elements 0.84643
published_at 2026-04-24T12:55:00Z
1
value 0.02253
scoring_system epss
scoring_elements 0.84516
published_at 2026-04-01T12:55:00Z
2
value 0.02253
scoring_system epss
scoring_elements 0.84615
published_at 2026-04-18T12:55:00Z
3
value 0.02253
scoring_system epss
scoring_elements 0.84617
published_at 2026-04-21T12:55:00Z
4
value 0.02253
scoring_system epss
scoring_elements 0.84532
published_at 2026-04-02T12:55:00Z
5
value 0.02253
scoring_system epss
scoring_elements 0.84553
published_at 2026-04-04T12:55:00Z
6
value 0.02253
scoring_system epss
scoring_elements 0.84556
published_at 2026-04-07T12:55:00Z
7
value 0.02253
scoring_system epss
scoring_elements 0.84578
published_at 2026-04-08T12:55:00Z
8
value 0.02253
scoring_system epss
scoring_elements 0.84585
published_at 2026-04-09T12:55:00Z
9
value 0.02253
scoring_system epss
scoring_elements 0.84604
published_at 2026-04-11T12:55:00Z
10
value 0.02253
scoring_system epss
scoring_elements 0.84599
published_at 2026-04-12T12:55:00Z
11
value 0.02253
scoring_system epss
scoring_elements 0.84594
published_at 2026-04-13T12:55:00Z
12
value 0.02253
scoring_system epss
scoring_elements 0.84614
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4204
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=778603
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=778603
9
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
10
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
11
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
12
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
13
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
14
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16766
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16766
16
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-96.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-96.html
17
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
18
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
19
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
20
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877624
reference_id 877624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877624
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204
reference_id CVE-2012-4204
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4204
reference_id CVE-2012-4204
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-4204
41
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-96
reference_id mfsa2012-96
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-96
43
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
44
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-4204
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvn3-2xv4-jycs
10
url VCID-wbsm-vcr8-17ac
vulnerability_id VCID-wbsm-vcr8-17ac
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://osvdb.org/87587
reference_id
reference_type
scores
url http://osvdb.org/87587
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1482.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1482.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2012-1483.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1483.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4207.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4207.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4207
reference_id
reference_type
scores
0
value 0.01278
scoring_system epss
scoring_elements 0.79624
published_at 2026-04-24T12:55:00Z
1
value 0.01278
scoring_system epss
scoring_elements 0.7951
published_at 2026-04-01T12:55:00Z
2
value 0.01278
scoring_system epss
scoring_elements 0.79587
published_at 2026-04-18T12:55:00Z
3
value 0.01278
scoring_system epss
scoring_elements 0.79592
published_at 2026-04-21T12:55:00Z
4
value 0.01278
scoring_system epss
scoring_elements 0.79516
published_at 2026-04-02T12:55:00Z
5
value 0.01278
scoring_system epss
scoring_elements 0.79538
published_at 2026-04-04T12:55:00Z
6
value 0.01278
scoring_system epss
scoring_elements 0.79526
published_at 2026-04-07T12:55:00Z
7
value 0.01278
scoring_system epss
scoring_elements 0.79554
published_at 2026-04-08T12:55:00Z
8
value 0.01278
scoring_system epss
scoring_elements 0.79561
published_at 2026-04-09T12:55:00Z
9
value 0.01278
scoring_system epss
scoring_elements 0.79583
published_at 2026-04-11T12:55:00Z
10
value 0.01278
scoring_system epss
scoring_elements 0.79567
published_at 2026-04-12T12:55:00Z
11
value 0.01278
scoring_system epss
scoring_elements 0.79559
published_at 2026-04-13T12:55:00Z
12
value 0.01278
scoring_system epss
scoring_elements 0.79589
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4207
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=801681
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=801681
11
reference_url http://secunia.com/advisories/51359
reference_id
reference_type
scores
url http://secunia.com/advisories/51359
12
reference_url http://secunia.com/advisories/51360
reference_id
reference_type
scores
url http://secunia.com/advisories/51360
13
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
14
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
15
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
16
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
17
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
18
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80179
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80179
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16955
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16955
21
reference_url http://www.debian.org/security/2012/dsa-2583
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2583
22
reference_url http://www.debian.org/security/2012/dsa-2584
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2584
23
reference_url http://www.debian.org/security/2012/dsa-2588
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2588
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
25
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-101.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-101.html
26
reference_url http://www.palemoon.org/releasenotes-ng.shtml
reference_id
reference_type
scores
url http://www.palemoon.org/releasenotes-ng.shtml
27
reference_url http://www.securityfocus.com/bid/56632
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56632
28
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
29
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
30
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
31
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877629
reference_id 877629
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877629
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207
reference_id CVE-2012-4207
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4207
reference_id CVE-2012-4207
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4207
62
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
63
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-101
reference_id mfsa2012-101
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-101
64
reference_url https://access.redhat.com/errata/RHSA-2012:1482
reference_id RHSA-2012:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1482
65
reference_url https://access.redhat.com/errata/RHSA-2012:1483
reference_id RHSA-2012:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1483
66
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
67
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-4207
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbsm-vcr8-17ac
11
url VCID-y56t-avfk-skg2
vulnerability_id VCID-y56t-avfk-skg2
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2012-1482.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1482.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1483.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1483.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4202.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4202.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4202
reference_id
reference_type
scores
0
value 0.02636
scoring_system epss
scoring_elements 0.85745
published_at 2026-04-24T12:55:00Z
1
value 0.02636
scoring_system epss
scoring_elements 0.85625
published_at 2026-04-01T12:55:00Z
2
value 0.02636
scoring_system epss
scoring_elements 0.85727
published_at 2026-04-18T12:55:00Z
3
value 0.02636
scoring_system epss
scoring_elements 0.85721
published_at 2026-04-21T12:55:00Z
4
value 0.02636
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-02T12:55:00Z
5
value 0.02636
scoring_system epss
scoring_elements 0.85655
published_at 2026-04-04T12:55:00Z
6
value 0.02636
scoring_system epss
scoring_elements 0.85662
published_at 2026-04-07T12:55:00Z
7
value 0.02636
scoring_system epss
scoring_elements 0.85681
published_at 2026-04-08T12:55:00Z
8
value 0.02636
scoring_system epss
scoring_elements 0.85693
published_at 2026-04-09T12:55:00Z
9
value 0.02636
scoring_system epss
scoring_elements 0.85707
published_at 2026-04-11T12:55:00Z
10
value 0.02636
scoring_system epss
scoring_elements 0.85703
published_at 2026-04-12T12:55:00Z
11
value 0.02636
scoring_system epss
scoring_elements 0.857
published_at 2026-04-13T12:55:00Z
12
value 0.02636
scoring_system epss
scoring_elements 0.85722
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4202
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=758200
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=758200
10
reference_url http://secunia.com/advisories/51359
reference_id
reference_type
scores
url http://secunia.com/advisories/51359
11
reference_url http://secunia.com/advisories/51360
reference_id
reference_type
scores
url http://secunia.com/advisories/51360
12
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
13
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
14
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
15
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
16
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
17
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80170
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80170
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16739
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16739
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
21
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-92.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-92.html
22
reference_url http://www.securityfocus.com/bid/56614
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56614
23
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
24
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
25
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
26
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877615
reference_id 877615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877615
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202
reference_id CVE-2012-4202
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4202
reference_id CVE-2012-4202
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-4202
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-92
reference_id mfsa2012-92
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-92
57
reference_url https://access.redhat.com/errata/RHSA-2012:1482
reference_id RHSA-2012:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1482
58
reference_url https://access.redhat.com/errata/RHSA-2012:1483
reference_id RHSA-2012:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1483
59
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
60
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
aliases CVE-2012-4202
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y56t-avfk-skg2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0