{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T04:30:34.984","vulnerabilities":[{"cve":{"id":"CVE-2012-0452","sourceIdentifier":"cve@mitre.org","published":"2012-02-11T02:55:00.830","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding."},{"lang":"es","value":"Vulnerabilidad de uso después de liberar en Mozilla Firefox v10.x anteriores a v10.0.1, Thunderbird v10.x anteriores a v10.0.1, y SeaMonkey v2.7 permite a usuarios remotos provocar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código de su eleccion a través de vectores que disparan fallos en la llamada a la función nsXBLDocumentInfo::ReadPrototypeBindings, relativo al acceso periódico al colector de tabla hash que contienen un enlace viejo.\r\n"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*","matchCriteriaId":"A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*","matchCriteriaId":"FD390621-599E-4B61-B51E-454AE6EC1A7B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*","matchCriteriaId":"EB949258-274B-46CE-BA9F-1B63F6E242C8"}]}]}],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00012.html","source":"cve@mitre.org"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00013.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/48110","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/49055","source":"cve@mitre.org"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:017","source":"cve@mitre.org"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:018","source":"cve@mitre.org"},{"url":"http://www.mozilla.org/security/announce/2012/mfsa2012-10.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/51975","source":"cve@mitre.org"},{"url":"http://www.ubuntu.com/usn/USN-1360-1","source":"cve@mitre.org"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=724284","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15017","source":"cve@mitre.org"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00012.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00013.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/48110","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/49055","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:017","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:018","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.mozilla.org/security/announce/2012/mfsa2012-10.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/51975","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/USN-1360-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=724284","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15017","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}