{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SeaMonkey versions inf\u00e9rieures \u00e0 2.6.","product":{"name":"N/A","vendor":{"name":"Mozilla","scada":false}}},{"description":"Firefox versions 4.0 \u00e0 8.0 incluses ;","product":{"name":"Firefox","vendor":{"name":"Mozilla","scada":false}}},{"description":"Thunderbird versions 5.0 \u00e0 8.0 incluses ;","product":{"name":"Thunderbird","vendor":{"name":"Mozilla","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-3671","url":"https://www.cve.org/CVERecord?id=CVE-2012-3671"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla mfsa2012-41 du    18 juin 2012 :","url":"http://www.mozilla.org/security/announce/2012/mfsa2012-41.html"}],"reference":"CERTA-2012-AVI-340","revisions":[{"description":"version initiale.","revision_date":"2012-06-19T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans la fonction <span\nclass=\"textit\">nsHTMLSelectElement</span> permet \u00e0 un attaquant\nd'ex\u00e9cuter du code arbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9 dans des produits Mozilla","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Mozilla 2012-41 du 18 juin 2012","url":null}]}
