Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-azav-xevg-a3f1
Summary
Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting five additional use-after-free, out of bounds read, and buffer overflow flaws introduced during Firefox development that were fixed before general release. 
In general these flaws cannot be exploited through email in the
Thunderbird and SeaMonkey products because scripting is disabled, but are
potentially a risk in browser or browser-like contexts in those products.
Aliases
0
alias CVE-2012-4214
Fixed_packages
0
url pkg:mozilla/Firefox@17.0.0
purl pkg:mozilla/Firefox@17.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@17.0.0
1
url pkg:mozilla/Firefox%20ESR@10.0.11
purl pkg:mozilla/Firefox%20ESR@10.0.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520ESR@10.0.11
2
url pkg:mozilla/SeaMonkey@2.14.0
purl pkg:mozilla/SeaMonkey@2.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0
3
url pkg:mozilla/Thunderbird@17.0.0
purl pkg:mozilla/Thunderbird@17.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@17.0.0
4
url pkg:mozilla/Thunderbird%20ESR@10.0.11
purl pkg:mozilla/Thunderbird%20ESR@10.0.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.11
Affected_packages
0
url pkg:rpm/redhat/firefox@10.0.11-1?arch=el6_3
purl pkg:rpm/redhat/firefox@10.0.11-1?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mfm-m3jn-9uf3
1
vulnerability VCID-368m-kv1t-uuc3
2
vulnerability VCID-5v1h-mrzk-h7cv
3
vulnerability VCID-661x-rm3w-qke1
4
vulnerability VCID-74xj-6yst-nkdx
5
vulnerability VCID-azav-xevg-a3f1
6
vulnerability VCID-e6cv-9zf1-cycr
7
vulnerability VCID-fwa9-k9ug-ffdg
8
vulnerability VCID-gzac-u9ku-t3fj
9
vulnerability VCID-p9t8-9m9m-rbg5
10
vulnerability VCID-qxjr-9644-e7h1
11
vulnerability VCID-rgkp-48gp-kfb8
12
vulnerability VCID-upyy-ckwb-vybt
13
vulnerability VCID-wbsm-vcr8-17ac
14
vulnerability VCID-xget-uuf7-4kcy
15
vulnerability VCID-y56t-avfk-skg2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@10.0.11-1%3Farch=el6_3
1
url pkg:rpm/redhat/firefox@10.0.11-1?arch=el5_8
purl pkg:rpm/redhat/firefox@10.0.11-1?arch=el5_8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mfm-m3jn-9uf3
1
vulnerability VCID-368m-kv1t-uuc3
2
vulnerability VCID-5v1h-mrzk-h7cv
3
vulnerability VCID-661x-rm3w-qke1
4
vulnerability VCID-74xj-6yst-nkdx
5
vulnerability VCID-azav-xevg-a3f1
6
vulnerability VCID-e6cv-9zf1-cycr
7
vulnerability VCID-fwa9-k9ug-ffdg
8
vulnerability VCID-gzac-u9ku-t3fj
9
vulnerability VCID-p9t8-9m9m-rbg5
10
vulnerability VCID-qxjr-9644-e7h1
11
vulnerability VCID-rgkp-48gp-kfb8
12
vulnerability VCID-upyy-ckwb-vybt
13
vulnerability VCID-wbsm-vcr8-17ac
14
vulnerability VCID-xget-uuf7-4kcy
15
vulnerability VCID-y56t-avfk-skg2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@10.0.11-1%3Farch=el5_8
2
url pkg:rpm/redhat/thunderbird@10.0.11-1?arch=el5_8
purl pkg:rpm/redhat/thunderbird@10.0.11-1?arch=el5_8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mfm-m3jn-9uf3
1
vulnerability VCID-5v1h-mrzk-h7cv
2
vulnerability VCID-661x-rm3w-qke1
3
vulnerability VCID-74xj-6yst-nkdx
4
vulnerability VCID-azav-xevg-a3f1
5
vulnerability VCID-e6cv-9zf1-cycr
6
vulnerability VCID-fwa9-k9ug-ffdg
7
vulnerability VCID-gzac-u9ku-t3fj
8
vulnerability VCID-p9t8-9m9m-rbg5
9
vulnerability VCID-qxjr-9644-e7h1
10
vulnerability VCID-rgkp-48gp-kfb8
11
vulnerability VCID-upyy-ckwb-vybt
12
vulnerability VCID-wbsm-vcr8-17ac
13
vulnerability VCID-xget-uuf7-4kcy
14
vulnerability VCID-y56t-avfk-skg2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@10.0.11-1%3Farch=el5_8
3
url pkg:rpm/redhat/thunderbird@10.0.11-1?arch=el6_3
purl pkg:rpm/redhat/thunderbird@10.0.11-1?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mfm-m3jn-9uf3
1
vulnerability VCID-5v1h-mrzk-h7cv
2
vulnerability VCID-661x-rm3w-qke1
3
vulnerability VCID-74xj-6yst-nkdx
4
vulnerability VCID-azav-xevg-a3f1
5
vulnerability VCID-e6cv-9zf1-cycr
6
vulnerability VCID-fwa9-k9ug-ffdg
7
vulnerability VCID-gzac-u9ku-t3fj
8
vulnerability VCID-p9t8-9m9m-rbg5
9
vulnerability VCID-qxjr-9644-e7h1
10
vulnerability VCID-rgkp-48gp-kfb8
11
vulnerability VCID-upyy-ckwb-vybt
12
vulnerability VCID-wbsm-vcr8-17ac
13
vulnerability VCID-xget-uuf7-4kcy
14
vulnerability VCID-y56t-avfk-skg2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@10.0.11-1%3Farch=el6_3
4
url pkg:rpm/redhat/xulrunner@10.0.11-1?arch=el6_3
purl pkg:rpm/redhat/xulrunner@10.0.11-1?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mfm-m3jn-9uf3
1
vulnerability VCID-368m-kv1t-uuc3
2
vulnerability VCID-5v1h-mrzk-h7cv
3
vulnerability VCID-661x-rm3w-qke1
4
vulnerability VCID-74xj-6yst-nkdx
5
vulnerability VCID-azav-xevg-a3f1
6
vulnerability VCID-e6cv-9zf1-cycr
7
vulnerability VCID-fwa9-k9ug-ffdg
8
vulnerability VCID-gzac-u9ku-t3fj
9
vulnerability VCID-p9t8-9m9m-rbg5
10
vulnerability VCID-qxjr-9644-e7h1
11
vulnerability VCID-rgkp-48gp-kfb8
12
vulnerability VCID-upyy-ckwb-vybt
13
vulnerability VCID-wbsm-vcr8-17ac
14
vulnerability VCID-xget-uuf7-4kcy
15
vulnerability VCID-y56t-avfk-skg2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@10.0.11-1%3Farch=el6_3
5
url pkg:rpm/redhat/xulrunner@10.0.11-1?arch=el5_8
purl pkg:rpm/redhat/xulrunner@10.0.11-1?arch=el5_8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mfm-m3jn-9uf3
1
vulnerability VCID-368m-kv1t-uuc3
2
vulnerability VCID-5v1h-mrzk-h7cv
3
vulnerability VCID-661x-rm3w-qke1
4
vulnerability VCID-74xj-6yst-nkdx
5
vulnerability VCID-azav-xevg-a3f1
6
vulnerability VCID-e6cv-9zf1-cycr
7
vulnerability VCID-fwa9-k9ug-ffdg
8
vulnerability VCID-gzac-u9ku-t3fj
9
vulnerability VCID-p9t8-9m9m-rbg5
10
vulnerability VCID-qxjr-9644-e7h1
11
vulnerability VCID-rgkp-48gp-kfb8
12
vulnerability VCID-upyy-ckwb-vybt
13
vulnerability VCID-wbsm-vcr8-17ac
14
vulnerability VCID-xget-uuf7-4kcy
15
vulnerability VCID-y56t-avfk-skg2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@10.0.11-1%3Farch=el5_8
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2012-1482.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1482.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1483.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1483.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4214.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4214.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4214
reference_id
reference_type
scores
0
value 0.02337
scoring_system epss
scoring_elements 0.84873
published_at 2026-04-18T12:55:00Z
1
value 0.02337
scoring_system epss
scoring_elements 0.84777
published_at 2026-04-01T12:55:00Z
2
value 0.02337
scoring_system epss
scoring_elements 0.84857
published_at 2026-04-12T12:55:00Z
3
value 0.02337
scoring_system epss
scoring_elements 0.84851
published_at 2026-04-13T12:55:00Z
4
value 0.02337
scoring_system epss
scoring_elements 0.84792
published_at 2026-04-02T12:55:00Z
5
value 0.02337
scoring_system epss
scoring_elements 0.84811
published_at 2026-04-04T12:55:00Z
6
value 0.02337
scoring_system epss
scoring_elements 0.84813
published_at 2026-04-07T12:55:00Z
7
value 0.02337
scoring_system epss
scoring_elements 0.84835
published_at 2026-04-08T12:55:00Z
8
value 0.02337
scoring_system epss
scoring_elements 0.84842
published_at 2026-04-09T12:55:00Z
9
value 0.02337
scoring_system epss
scoring_elements 0.8486
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4214
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=795804
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=795804
10
reference_url http://secunia.com/advisories/51359
reference_id
reference_type
scores
url http://secunia.com/advisories/51359
11
reference_url http://secunia.com/advisories/51360
reference_id
reference_type
scores
url http://secunia.com/advisories/51360
12
reference_url http://secunia.com/advisories/51369
reference_id
reference_type
scores
url http://secunia.com/advisories/51369
13
reference_url http://secunia.com/advisories/51370
reference_id
reference_type
scores
url http://secunia.com/advisories/51370
14
reference_url http://secunia.com/advisories/51381
reference_id
reference_type
scores
url http://secunia.com/advisories/51381
15
reference_url http://secunia.com/advisories/51434
reference_id
reference_type
scores
url http://secunia.com/advisories/51434
16
reference_url http://secunia.com/advisories/51439
reference_id
reference_type
scores
url http://secunia.com/advisories/51439
17
reference_url http://secunia.com/advisories/51440
reference_id
reference_type
scores
url http://secunia.com/advisories/51440
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80187
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80187
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16884
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16884
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
21
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
22
reference_url http://www.palemoon.org/releasenotes-ng.shtml
reference_id
reference_type
scores
url http://www.palemoon.org/releasenotes-ng.shtml
23
reference_url http://www.securityfocus.com/bid/56628
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56628
24
reference_url http://www.ubuntu.com/usn/USN-1636-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1636-1
25
reference_url http://www.ubuntu.com/usn/USN-1638-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-1
26
reference_url http://www.ubuntu.com/usn/USN-1638-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-2
27
reference_url http://www.ubuntu.com/usn/USN-1638-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1638-3
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877634
reference_id 877634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877634
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214
reference_id CVE-2012-4214
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4214
reference_id CVE-2012-4214
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-4214
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-105
reference_id mfsa2012-105
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-105
57
reference_url https://access.redhat.com/errata/RHSA-2012:1482
reference_id RHSA-2012:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1482
58
reference_url https://access.redhat.com/errata/RHSA-2012:1483
reference_id RHSA-2012:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1483
59
reference_url https://usn.ubuntu.com/1636-1/
reference_id USN-1636-1
reference_type
scores
url https://usn.ubuntu.com/1636-1/
60
reference_url https://usn.ubuntu.com/1638-1/
reference_id USN-1638-1
reference_type
scores
url https://usn.ubuntu.com/1638-1/
Weaknesses
0
cwe_id 416
name Use After Free
description Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
1
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score9.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-azav-xevg-a3f1