{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2004-0757","title":"Title"},{"category":"description","text":"Heap-based buffer overflow in the SendUidl in the POP3 capability for Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, may allow remote POP3 mail servers to execute arbitrary code.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2004-0757","url":"https://www.suse.com/security/cve/CVE-2004-0757"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 58569 for CVE-2004-0757","url":"https://bugzilla.suse.com/58569"},{"category":"external","summary":"SUSE Bug 62691 for CVE-2004-0757","url":"https://bugzilla.suse.com/62691"},{"category":"external","summary":"Advisory link for SUSE-SA:2004:030","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCYQEY33LMVWYM2MLKMHT72NLYKPYSK4/#MCYQEY33LMVWYM2MLKMHT72NLYKPYSK4"},{"category":"external","summary":"Advisory link for SUSE-SA:2004:032","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXVYVUFBSSZLZPAXFKKWOGCARCUXJ6HU/#IXVYVUFBSSZLZPAXFKKWOGCARCUXJ6HU"},{"category":"external","summary":"Advisory link for SUSE-SA:2004:033","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6VUXGUWDAD2H5MVFKMBZNQH54H6JDOM/#I6VUXGUWDAD2H5MVFKMBZNQH54H6JDOM"},{"category":"external","summary":"Advisory link for SUSE-SA:2004:034","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C7PSNIUXYF5NWCFW3OOCXDUSJ6C3JLWF/#C7PSNIUXYF5NWCFW3OOCXDUSJ6C3JLWF"},{"category":"external","summary":"Advisory link for SUSE-SA:2004:035","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA2YG3LJMMFHXGD3MIMTOHLMUTXTSWNP/#FA2YG3LJMMFHXGD3MIMTOHLMUTXTSWNP"}],"title":"SUSE CVE CVE-2004-0757","tracking":{"current_release_date":"2023-12-09T03:44:39Z","generator":{"date":"2023-02-15T06:20:34Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2004-0757","initial_release_date":"2023-02-15T06:20:34Z","revision_history":[{"date":"2023-02-15T06:20:34Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:23:07Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:44:39Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}