Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/63576?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63576?format=api",
    "vulnerability_id": "VCID-azav-xevg-a3f1",
    "summary": "Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting five additional use-after-free, out of bounds read, and buffer overflow flaws introduced during Firefox development that were fixed before general release. \nIn general these flaws cannot be exploited through email in the\nThunderbird and SeaMonkey products because scripting is disabled, but are\npotentially a risk in browser or browser-like contexts in those products.",
    "aliases": [
        {
            "alias": "CVE-2012-4214"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/86631?format=api",
            "purl": "pkg:mozilla/Firefox@17.0.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@17.0.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/86547?format=api",
            "purl": "pkg:mozilla/Firefox%20ESR@10.0.11",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520ESR@10.0.11"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/86634?format=api",
            "purl": "pkg:mozilla/SeaMonkey@2.14.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.14.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/86632?format=api",
            "purl": "pkg:mozilla/Thunderbird@17.0.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@17.0.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/86633?format=api",
            "purl": "pkg:mozilla/Thunderbird%20ESR@10.0.11",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@10.0.11"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/125663?format=api",
            "purl": "pkg:rpm/redhat/firefox@10.0.11-1?arch=el6_3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1mfm-m3jn-9uf3"
                },
                {
                    "vulnerability": "VCID-368m-kv1t-uuc3"
                },
                {
                    "vulnerability": "VCID-5v1h-mrzk-h7cv"
                },
                {
                    "vulnerability": "VCID-661x-rm3w-qke1"
                },
                {
                    "vulnerability": "VCID-74xj-6yst-nkdx"
                },
                {
                    "vulnerability": "VCID-azav-xevg-a3f1"
                },
                {
                    "vulnerability": "VCID-e6cv-9zf1-cycr"
                },
                {
                    "vulnerability": "VCID-fwa9-k9ug-ffdg"
                },
                {
                    "vulnerability": "VCID-gzac-u9ku-t3fj"
                },
                {
                    "vulnerability": "VCID-p9t8-9m9m-rbg5"
                },
                {
                    "vulnerability": "VCID-qxjr-9644-e7h1"
                },
                {
                    "vulnerability": "VCID-rgkp-48gp-kfb8"
                },
                {
                    "vulnerability": "VCID-upyy-ckwb-vybt"
                },
                {
                    "vulnerability": "VCID-wbsm-vcr8-17ac"
                },
                {
                    "vulnerability": "VCID-xget-uuf7-4kcy"
                },
                {
                    "vulnerability": "VCID-y56t-avfk-skg2"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@10.0.11-1%3Farch=el6_3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/125668?format=api",
            "purl": "pkg:rpm/redhat/firefox@10.0.11-1?arch=el5_8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1mfm-m3jn-9uf3"
                },
                {
                    "vulnerability": "VCID-368m-kv1t-uuc3"
                },
                {
                    "vulnerability": "VCID-5v1h-mrzk-h7cv"
                },
                {
                    "vulnerability": "VCID-661x-rm3w-qke1"
                },
                {
                    "vulnerability": "VCID-74xj-6yst-nkdx"
                },
                {
                    "vulnerability": "VCID-azav-xevg-a3f1"
                },
                {
                    "vulnerability": "VCID-e6cv-9zf1-cycr"
                },
                {
                    "vulnerability": "VCID-fwa9-k9ug-ffdg"
                },
                {
                    "vulnerability": "VCID-gzac-u9ku-t3fj"
                },
                {
                    "vulnerability": "VCID-p9t8-9m9m-rbg5"
                },
                {
                    "vulnerability": "VCID-qxjr-9644-e7h1"
                },
                {
                    "vulnerability": "VCID-rgkp-48gp-kfb8"
                },
                {
                    "vulnerability": "VCID-upyy-ckwb-vybt"
                },
                {
                    "vulnerability": "VCID-wbsm-vcr8-17ac"
                },
                {
                    "vulnerability": "VCID-xget-uuf7-4kcy"
                },
                {
                    "vulnerability": "VCID-y56t-avfk-skg2"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@10.0.11-1%3Farch=el5_8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/125664?format=api",
            "purl": "pkg:rpm/redhat/thunderbird@10.0.11-1?arch=el5_8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1mfm-m3jn-9uf3"
                },
                {
                    "vulnerability": "VCID-5v1h-mrzk-h7cv"
                },
                {
                    "vulnerability": "VCID-661x-rm3w-qke1"
                },
                {
                    "vulnerability": "VCID-74xj-6yst-nkdx"
                },
                {
                    "vulnerability": "VCID-azav-xevg-a3f1"
                },
                {
                    "vulnerability": "VCID-e6cv-9zf1-cycr"
                },
                {
                    "vulnerability": "VCID-fwa9-k9ug-ffdg"
                },
                {
                    "vulnerability": "VCID-gzac-u9ku-t3fj"
                },
                {
                    "vulnerability": "VCID-p9t8-9m9m-rbg5"
                },
                {
                    "vulnerability": "VCID-qxjr-9644-e7h1"
                },
                {
                    "vulnerability": "VCID-rgkp-48gp-kfb8"
                },
                {
                    "vulnerability": "VCID-upyy-ckwb-vybt"
                },
                {
                    "vulnerability": "VCID-wbsm-vcr8-17ac"
                },
                {
                    "vulnerability": "VCID-xget-uuf7-4kcy"
                },
                {
                    "vulnerability": "VCID-y56t-avfk-skg2"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@10.0.11-1%3Farch=el5_8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/125666?format=api",
            "purl": "pkg:rpm/redhat/thunderbird@10.0.11-1?arch=el6_3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1mfm-m3jn-9uf3"
                },
                {
                    "vulnerability": "VCID-5v1h-mrzk-h7cv"
                },
                {
                    "vulnerability": "VCID-661x-rm3w-qke1"
                },
                {
                    "vulnerability": "VCID-74xj-6yst-nkdx"
                },
                {
                    "vulnerability": "VCID-azav-xevg-a3f1"
                },
                {
                    "vulnerability": "VCID-e6cv-9zf1-cycr"
                },
                {
                    "vulnerability": "VCID-fwa9-k9ug-ffdg"
                },
                {
                    "vulnerability": "VCID-gzac-u9ku-t3fj"
                },
                {
                    "vulnerability": "VCID-p9t8-9m9m-rbg5"
                },
                {
                    "vulnerability": "VCID-qxjr-9644-e7h1"
                },
                {
                    "vulnerability": "VCID-rgkp-48gp-kfb8"
                },
                {
                    "vulnerability": "VCID-upyy-ckwb-vybt"
                },
                {
                    "vulnerability": "VCID-wbsm-vcr8-17ac"
                },
                {
                    "vulnerability": "VCID-xget-uuf7-4kcy"
                },
                {
                    "vulnerability": "VCID-y56t-avfk-skg2"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@10.0.11-1%3Farch=el6_3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/125665?format=api",
            "purl": "pkg:rpm/redhat/xulrunner@10.0.11-1?arch=el6_3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1mfm-m3jn-9uf3"
                },
                {
                    "vulnerability": "VCID-368m-kv1t-uuc3"
                },
                {
                    "vulnerability": "VCID-5v1h-mrzk-h7cv"
                },
                {
                    "vulnerability": "VCID-661x-rm3w-qke1"
                },
                {
                    "vulnerability": "VCID-74xj-6yst-nkdx"
                },
                {
                    "vulnerability": "VCID-azav-xevg-a3f1"
                },
                {
                    "vulnerability": "VCID-e6cv-9zf1-cycr"
                },
                {
                    "vulnerability": "VCID-fwa9-k9ug-ffdg"
                },
                {
                    "vulnerability": "VCID-gzac-u9ku-t3fj"
                },
                {
                    "vulnerability": "VCID-p9t8-9m9m-rbg5"
                },
                {
                    "vulnerability": "VCID-qxjr-9644-e7h1"
                },
                {
                    "vulnerability": "VCID-rgkp-48gp-kfb8"
                },
                {
                    "vulnerability": "VCID-upyy-ckwb-vybt"
                },
                {
                    "vulnerability": "VCID-wbsm-vcr8-17ac"
                },
                {
                    "vulnerability": "VCID-xget-uuf7-4kcy"
                },
                {
                    "vulnerability": "VCID-y56t-avfk-skg2"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@10.0.11-1%3Farch=el6_3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/125667?format=api",
            "purl": "pkg:rpm/redhat/xulrunner@10.0.11-1?arch=el5_8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1mfm-m3jn-9uf3"
                },
                {
                    "vulnerability": "VCID-368m-kv1t-uuc3"
                },
                {
                    "vulnerability": "VCID-5v1h-mrzk-h7cv"
                },
                {
                    "vulnerability": "VCID-661x-rm3w-qke1"
                },
                {
                    "vulnerability": "VCID-74xj-6yst-nkdx"
                },
                {
                    "vulnerability": "VCID-azav-xevg-a3f1"
                },
                {
                    "vulnerability": "VCID-e6cv-9zf1-cycr"
                },
                {
                    "vulnerability": "VCID-fwa9-k9ug-ffdg"
                },
                {
                    "vulnerability": "VCID-gzac-u9ku-t3fj"
                },
                {
                    "vulnerability": "VCID-p9t8-9m9m-rbg5"
                },
                {
                    "vulnerability": "VCID-qxjr-9644-e7h1"
                },
                {
                    "vulnerability": "VCID-rgkp-48gp-kfb8"
                },
                {
                    "vulnerability": "VCID-upyy-ckwb-vybt"
                },
                {
                    "vulnerability": "VCID-wbsm-vcr8-17ac"
                },
                {
                    "vulnerability": "VCID-xget-uuf7-4kcy"
                },
                {
                    "vulnerability": "VCID-y56t-avfk-skg2"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@10.0.11-1%3Farch=el5_8"
        }
    ],
    "references": [
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html"
        },
        {
            "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1482.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-1482.html"
        },
        {
            "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1483.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-1483.html"
        },
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4214.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4214.json"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4214",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84873",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84777",
                    "published_at": "2026-04-01T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84857",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84851",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84792",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84811",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84813",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84835",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.84842",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.02337",
                    "scoring_system": "epss",
                    "scoring_elements": "0.8486",
                    "published_at": "2026-04-11T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4214"
        },
        {
            "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=795804",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=795804"
        },
        {
            "reference_url": "http://secunia.com/advisories/51359",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://secunia.com/advisories/51359"
        },
        {
            "reference_url": "http://secunia.com/advisories/51360",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://secunia.com/advisories/51360"
        },
        {
            "reference_url": "http://secunia.com/advisories/51369",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://secunia.com/advisories/51369"
        },
        {
            "reference_url": "http://secunia.com/advisories/51370",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://secunia.com/advisories/51370"
        },
        {
            "reference_url": "http://secunia.com/advisories/51381",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://secunia.com/advisories/51381"
        },
        {
            "reference_url": "http://secunia.com/advisories/51434",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://secunia.com/advisories/51434"
        },
        {
            "reference_url": "http://secunia.com/advisories/51439",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://secunia.com/advisories/51439"
        },
        {
            "reference_url": "http://secunia.com/advisories/51440",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://secunia.com/advisories/51440"
        },
        {
            "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80187",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80187"
        },
        {
            "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16884",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16884"
        },
        {
            "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:173",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:173"
        },
        {
            "reference_url": "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html"
        },
        {
            "reference_url": "http://www.palemoon.org/releasenotes-ng.shtml",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.palemoon.org/releasenotes-ng.shtml"
        },
        {
            "reference_url": "http://www.securityfocus.com/bid/56628",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.securityfocus.com/bid/56628"
        },
        {
            "reference_url": "http://www.ubuntu.com/usn/USN-1636-1",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.ubuntu.com/usn/USN-1636-1"
        },
        {
            "reference_url": "http://www.ubuntu.com/usn/USN-1638-1",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.ubuntu.com/usn/USN-1638-1"
        },
        {
            "reference_url": "http://www.ubuntu.com/usn/USN-1638-2",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.ubuntu.com/usn/USN-1638-2"
        },
        {
            "reference_url": "http://www.ubuntu.com/usn/USN-1638-3",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.ubuntu.com/usn/USN-1638-3"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=877634",
            "reference_id": "877634",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877634"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
            "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214",
            "reference_id": "CVE-2012-4214",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4214",
            "reference_id": "CVE-2012-4214",
            "reference_type": "",
            "scores": [
                {
                    "value": "9.3",
                    "scoring_system": "cvssv2",
                    "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4214"
        },
        {
            "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-105",
            "reference_id": "mfsa2012-105",
            "reference_type": "",
            "scores": [
                {
                    "value": "critical",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-105"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2012:1482",
            "reference_id": "RHSA-2012:1482",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2012:1482"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2012:1483",
            "reference_id": "RHSA-2012:1483",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2012:1483"
        },
        {
            "reference_url": "https://usn.ubuntu.com/1636-1/",
            "reference_id": "USN-1636-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/1636-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/1638-1/",
            "reference_id": "USN-1638-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/1638-1/"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 416,
            "name": "Use After Free",
            "description": "Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."
        },
        {
            "cwe_id": 119,
            "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
            "description": "The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer."
        }
    ],
    "exploits": [],
    "severity_range_score": "9.0 - 10.0",
    "exploitability": "0.5",
    "weighted_severity": "9.0",
    "risk_score": 4.5,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-azav-xevg-a3f1"
}