rhsa-2008_0549
Vulnerability from csaf_redhat
Published
2008-07-02 12:48
Modified
2024-11-22 02:06
Summary
Red Hat Security Advisory: firefox security update

Notes

Topic
An updated firefox package that fixes several security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team.
Details
Mozilla Firefox is an open source Web browser. Multiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed web content was displayed. A web page containing specially-crafted content could potentially trick a Firefox user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Firefox. A web page containing malicious content could cause Firefox to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Firefox. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Firefox escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Firefox. (CVE-2008-2808) A flaw was found in the way Firefox displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) All Mozilla Firefox users should upgrade to this updated package, which contains backported patches that correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated firefox package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Mozilla Firefox is an open source Web browser.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. A web page containing such malicious content could cause Firefox\nto crash or, potentially, execute arbitrary code as the user running\nFirefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code as the user running Firefox.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A\nweb page containing specially-crafted content could potentially trick a\nFirefox user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Firefox. A web page\ncontaining malicious content could cause Firefox to reveal the contents of\na local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nFirefox. A malicious extension could read uninitialized memory, possibly\nleaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Firefox escaped a listing of local file names.\nIf a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running Firefox. (CVE-2008-2808)\n\nA flaw was found in the way Firefox displayed information about self-signed\ncertificates. It was possible for a self-signed certificate to contain\nmultiple alternate name entries, which were not all displayed to the user,\nallowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nAll Mozilla Firefox users should upgrade to this updated package, which\ncontains backported patches that correct these issues.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2008:0549",
        "url": "https://access.redhat.com/errata/RHSA-2008:0549"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#critical",
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "category": "external",
        "summary": "452597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452597"
      },
      {
        "category": "external",
        "summary": "452598",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452598"
      },
      {
        "category": "external",
        "summary": "452599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452599"
      },
      {
        "category": "external",
        "summary": "452600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452600"
      },
      {
        "category": "external",
        "summary": "452602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452602"
      },
      {
        "category": "external",
        "summary": "452604",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452604"
      },
      {
        "category": "external",
        "summary": "452605",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452605"
      },
      {
        "category": "external",
        "summary": "452709",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452709"
      },
      {
        "category": "external",
        "summary": "452710",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452710"
      },
      {
        "category": "external",
        "summary": "452711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452711"
      },
      {
        "category": "external",
        "summary": "452712",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452712"
      },
      {
        "category": "external",
        "summary": "453007",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453007"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0549.json"
      }
    ],
    "title": "Red Hat Security Advisory: firefox security update",
    "tracking": {
      "current_release_date": "2024-11-22T02:06:27+00:00",
      "generator": {
        "date": "2024-11-22T02:06:27+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2008:0549",
      "initial_release_date": "2008-07-02T12:48:00+00:00",
      "revision_history": [
        {
          "date": "2008-07-02T12:48:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2008-07-02T08:54:06+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T02:06:27+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
                "product": {
                  "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
                  "product_id": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.19.el4?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-0:1.5.0.12-0.19.el4.ia64",
                "product": {
                  "name": "firefox-0:1.5.0.12-0.19.el4.ia64",
                  "product_id": "firefox-0:1.5.0.12-0.19.el4.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.19.el4?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
                "product": {
                  "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
                  "product_id": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.19.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-0:1.5.0.12-0.19.el4.x86_64",
                "product": {
                  "name": "firefox-0:1.5.0.12-0.19.el4.x86_64",
                  "product_id": "firefox-0:1.5.0.12-0.19.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.19.el4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
                "product": {
                  "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
                  "product_id": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.19.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-0:1.5.0.12-0.19.el4.i386",
                "product": {
                  "name": "firefox-0:1.5.0.12-0.19.el4.i386",
                  "product_id": "firefox-0:1.5.0.12-0.19.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.19.el4?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:1.5.0.12-0.19.el4.src",
                "product": {
                  "name": "firefox-0:1.5.0.12-0.19.el4.src",
                  "product_id": "firefox-0:1.5.0.12-0.19.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.19.el4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
                "product": {
                  "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
                  "product_id": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.19.el4?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-0:1.5.0.12-0.19.el4.ppc",
                "product": {
                  "name": "firefox-0:1.5.0.12-0.19.el4.ppc",
                  "product_id": "firefox-0:1.5.0.12-0.19.el4.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.19.el4?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
                "product": {
                  "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
                  "product_id": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.19.el4?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-0:1.5.0.12-0.19.el4.s390x",
                "product": {
                  "name": "firefox-0:1.5.0.12-0.19.el4.s390x",
                  "product_id": "firefox-0:1.5.0.12-0.19.el4.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.19.el4?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
                "product": {
                  "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
                  "product_id": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.19.el4?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-0:1.5.0.12-0.19.el4.s390",
                "product": {
                  "name": "firefox-0:1.5.0.12-0.19.el4.s390",
                  "product_id": "firefox-0:1.5.0.12-0.19.el4.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.19.el4?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.5.0.12-0.19.el4.i386"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.5.0.12-0.19.el4.ia64"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.5.0.12-0.19.el4.ppc"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.5.0.12-0.19.el4.s390"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.5.0.12-0.19.el4.s390x"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.5.0.12-0.19.el4.src"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.5.0.12-0.19.el4.src"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.5.0.12-0.19.el4.i386"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.5.0.12-0.19.el4.ia64"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.5.0.12-0.19.el4.ppc"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.5.0.12-0.19.el4.s390"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.5.0.12-0.19.el4.s390x"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.5.0.12-0.19.el4.src"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.5.0.12-0.19.el4.i386"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.5.0.12-0.19.el4.ia64"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.5.0.12-0.19.el4.ppc"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.5.0.12-0.19.el4.s390"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.5.0.12-0.19.el4.s390x"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.5.0.12-0.19.el4.src"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:1.5.0.12-0.19.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64"
        },
        "product_reference": "firefox-0:1.5.0.12-0.19.el4.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-2798",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox malformed web content flaws",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2798"
        },
        {
          "category": "external",
          "summary": "RHBZ#452597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2798"
        }
      ],
      "release_date": "2008-07-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Firefox malformed web content flaws"
    },
    {
      "cve": "CVE-2008-2799",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452598"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox javascript arbitrary code execution",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2799"
        },
        {
          "category": "external",
          "summary": "RHBZ#452598",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452598"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2799",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2799"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2799",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2799"
        }
      ],
      "release_date": "2008-07-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Firefox javascript arbitrary code execution"
    },
    {
      "cve": "CVE-2008-2800",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452599"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors involving (1) an event handler attached to an outer window, (2) a SCRIPT element in an unloaded document, or (3) the onreadystatechange handler in conjunction with an XMLHttpRequest.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox XSS attacks",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2800"
        },
        {
          "category": "external",
          "summary": "RHBZ#452599",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452599"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2800",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2800"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2800",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2800"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Firefox XSS attacks"
    },
    {
      "cve": "CVE-2008-2801",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452605"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox arbitrary signed JAR code execution",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2801"
        },
        {
          "category": "external",
          "summary": "RHBZ#452605",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452605"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2801",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2801"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2801",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2801"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Firefox arbitrary signed JAR code execution"
    },
    {
      "cve": "CVE-2008-2802",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452600"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file\u0027s \"privilege level.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox arbitrary JavaScript code execution",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2802"
        },
        {
          "category": "external",
          "summary": "RHBZ#452600",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452600"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2802",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2802"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2802",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2802"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Firefox arbitrary JavaScript code execution"
    },
    {
      "cve": "CVE-2008-2803",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452602"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 does not apply XPCNativeWrappers to scripts loaded from (1) file: URIs, (2) data: URIs, or (3) certain non-canonical chrome: URIs, which allows remote attackers to execute arbitrary code via vectors involving third-party add-ons.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox javascript arbitrary code execution",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2803"
        },
        {
          "category": "external",
          "summary": "RHBZ#452602",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452602"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2803",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2803"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2803",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2803"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Firefox javascript arbitrary code execution"
    },
    {
      "cve": "CVE-2008-2805",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452604"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to force the upload of arbitrary local files from a client computer via vectors involving originalTarget and DOM Range.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox arbitrary file disclosure",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2805"
        },
        {
          "category": "external",
          "summary": "RHBZ#452604",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452604"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2805",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2805"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2805",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2805"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Firefox arbitrary file disclosure"
    },
    {
      "cve": "CVE-2008-2807",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452709"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox .properties memory leak",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2807"
        },
        {
          "category": "external",
          "summary": "RHBZ#452709",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452709"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2807",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2807"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2807",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2807"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Firefox .properties memory leak"
    },
    {
      "cve": "CVE-2008-2808",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452710"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox file location escaping flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2808"
        },
        {
          "category": "external",
          "summary": "RHBZ#452710",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452710"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2808",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2808"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2808",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2808"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Firefox file location escaping flaw"
    },
    {
      "cve": "CVE-2008-2809",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452711"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox self signed certificate flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2809"
        },
        {
          "category": "external",
          "summary": "RHBZ#452711",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452711"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2809",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2809"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2809",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2809"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Firefox self signed certificate flaw"
    },
    {
      "cve": "CVE-2008-2810",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "452712"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox arbitrary file disclosure",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2810"
        },
        {
          "category": "external",
          "summary": "RHBZ#452712",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452712"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2810",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2810"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2810",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2810"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Firefox arbitrary file disclosure"
    },
    {
      "cve": "CVE-2008-2811",
      "discovery_date": "2008-06-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453007"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Firefox block reflow flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-0:1.5.0.12-0.19.el4.src",
          "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
          "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-0:1.5.0.12-0.19.el4.src",
          "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-0:1.5.0.12-0.19.el4.src",
          "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
          "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2811"
        },
        {
          "category": "external",
          "summary": "RHBZ#453007",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453007"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2811",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2811"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2811",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2811"
        }
      ],
      "release_date": "2008-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2008-07-02T12:48:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.  \n\nThis update is available via Red Hat Network.  Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
          "product_ids": [
            "4AS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-0:1.5.0.12-0.19.el4.src",
            "4AS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4AS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.src",
            "4Desktop:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4Desktop:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-0:1.5.0.12-0.19.el4.src",
            "4ES:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4ES:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-0:1.5.0.12-0.19.el4.src",
            "4WS:firefox-0:1.5.0.12-0.19.el4.x86_64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.i386",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ia64",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.ppc",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.s390x",
            "4WS:firefox-debuginfo-0:1.5.0.12-0.19.el4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2008:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "Firefox block reflow flaw"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.