← Voltar para CVEs
CVE-2012-1971
N/ADescricao
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to garbage collection after certain MethodJIT execution, and unknown other vectors.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado8/29/2012
Ultima modificacao4/29/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
mozilla:firefoxmozilla:seamonkeymozilla:thunderbird
Referencias
http://www.ubuntu.com/usn/USN-1548-1(cve@mitre.org)
http://www.ubuntu.com/usn/USN-1548-2(cve@mitre.org)
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=719750(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=730208(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=732870(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=748119(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=749039(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=752038(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=752087(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=753162(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=754150(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=754242(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=755916(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=765936(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=773097(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=779849(cve@mitre.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=780712(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16841(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.mozilla.org/security/announce/2012/mfsa2012-57.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1548-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1548-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=719750(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=730208(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=732870(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=748119(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=749039(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=752038(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=752087(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=753162(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=754150(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=754242(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=755916(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=765936(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=773097(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=779849(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=780712(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16841(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.