{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T01:44:10.317","vulnerabilities":[{"cve":{"id":"CVE-2012-1943","sourceIdentifier":"cve@mitre.org","published":"2012-06-05T23:55:01.733","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in Updater.exe in the Windows Updater Service in Mozilla Firefox 12.0, Thunderbird 12.0, and SeaMonkey 2.9 on Windows allows local users to gain privileges via a Trojan horse wsock32.dll file in an application directory."},{"lang":"es","value":"Una vulnerabilidad de ruta de búqueda no confiable en Updater.exe en el servicio 'Windows Updater' de Mozilla Firefox v12.0, Thunderbird v12.0 y SeaMonkey v2.9 en Windows permite a usuarios locales conseguir privilegios a través de un archivo troyano wsock32.dll en un directorio de aplicación."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:12.0:*:*:*:*:*:*:*","matchCriteriaId":"DF604D56-5D81-4276-88A1-AE321929E22A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:2.9:*:*:*:*:*:*:*","matchCriteriaId":"D8ED58FE-C6CE-4996-B11B-48B5EB9F651B"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:12.0:*:*:*:*:*:*:*","matchCriteriaId":"FEFF0965-0691-47AE-9A9B-36E428C69F4B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","matchCriteriaId":"2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}]}]}],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html","source":"cve@mitre.org"},{"url":"http://www.mozilla.org/security/announce/2012/mfsa2012-35.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=750850","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16924","source":"cve@mitre.org"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.mozilla.org/security/announce/2012/mfsa2012-35.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=750850","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16924","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'"}}]}