Quantcast
Channel: Oracle Bloggers
Viewing all articles
Browse latest Browse all 19780

Multiple vulnerabilities in Thunderbird

$
0
0
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-1948 Denial of service (DoS) vulnerability9.3Thunderbird
Solaris 10SPARC: 145200-12 X86: 145201-12
CVE-2012-1950 Address spoofing vulnerability6.4
CVE-2012-1951 Resource Management Errors vulnerability10.0
CVE-2012-1952 Resource Management Errors vulnerability9.3
CVE-2012-1953 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability9.3
CVE-2012-1954 Resource Management Errors vulnerability10.0
CVE-2012-1955 Address spoofing vulnerability6.8
CVE-2012-1957 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability4.3
CVE-2012-1958 Resource Management Errors vulnerability9.3
CVE-2012-1959 Permissions, Privileges, and Access Controls vulnerability5.0
CVE-2012-1961 Improper Input Validation vulnerability4.3
CVE-2012-1962 Resource Management Errors vulnerability10.0
CVE-2012-1963 Permissions, Privileges, and Access Controls vulnerability4.3
CVE-2012-1964 Clickjacking vulnerability4.0
CVE-2012-1965 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability4.3
CVE-2012-1966 Permissions, Privileges, and Access Controls vulnerability4.3
CVE-2012-1967 Arbitrary code execution vulnerability10.0
CVE-2012-1970 Denial of service (DoS) vulnerability10.0
CVE-2012-1973 Resource Management Errors vulnerability10.0
CVE-2012-3966 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability10.0

This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.
Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.


Viewing all articles
Browse latest Browse all 19780

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>