Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-4102 (GCVE-0-2018-4102)
Vulnerability from cvelistv5
- n/a
URL | Tags | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:04:29.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103580", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103580" }, { "name": "1040606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040606" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208695" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-03T09:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "103580", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103580" }, { "name": "1040606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040606" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208695" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2018-4102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "103580", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103580" }, { "name": "1040606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040606" }, { "name": "https://support.apple.com/HT208695", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208695" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2018-4102", "datePublished": "2018-04-03T06:00:00", "dateReserved": "2018-01-02T00:00:00", "dateUpdated": "2024-08-05T05:04:29.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-4102\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2018-04-03T06:29:04.077\",\"lastModified\":\"2024-11-21T04:06:46.167\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \\\"Safari\\\" component. It allows remote attackers to spoof the address bar via a crafted web site.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en algunos productos Apple. Se ha visto afectado Safari en versiones anteriores a la 11,1. El problema afecta al componente \\\"Safari\\\". Permite que atacantes remotos suplanten la barra de direcciones mediante un sitio web manipulado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.1\",\"matchCriteriaId\":\"2683E773-F7E6-4B5A-B341-F34EC83368BB\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103580\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040606\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.apple.com/HT208695\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/103580\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040606\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.apple.com/HT208695\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-7qg6-34x4-w9r5
Vulnerability from github
An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar via a crafted web site.
{ "affected": [], "aliases": [ "CVE-2018-4102" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-04-03T06:29:00Z", "severity": "MODERATE" }, "details": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site.", "id": "GHSA-7qg6-34x4-w9r5", "modified": "2022-05-14T03:28:47Z", "published": "2022-05-14T03:28:47Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4102" }, { "type": "WEB", "url": "https://support.apple.com/HT208695" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103580" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040606" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ] }
CERTFR-2018-AVI-162
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Apple | Safari | Safari versions antérieures à 11.1 | ||
Apple | N/A | iTunes versions antérieures à 12.7.4 pour Windows | ||
Apple | N/A | iCloud pour Windows versions antérieures à 7.4 | ||
Apple | N/A | iOS versions antérieures à 11.3 | ||
Apple | N/A | watchOS versions antérieures à 4.3 | ||
Apple | N/A | OS X El Capitan sans la mise à jour de sécurité 2018-002 El Capitan | ||
Apple | N/A | Xcode versions antérieures à 9.3 | ||
Apple | macOS | macOS Sierra sans la mise à jour de sécurite 2018-002 Sierra | ||
Apple | macOS | macOS High Sierra versions antérieures à 10.13.4 | ||
Apple | N/A | tvOS versions antérieures à 11.3 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Safari versions ant\u00e9rieures \u00e0 11.1", "product": { "name": "Safari", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iTunes versions ant\u00e9rieures \u00e0 12.7.4 pour Windows", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 7.4", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iOS versions ant\u00e9rieures \u00e0 11.3", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "watchOS versions ant\u00e9rieures \u00e0 4.3", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "OS X El Capitan sans la mise \u00e0 jour de s\u00e9curit\u00e9 2018-002 El Capitan", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Xcode versions ant\u00e9rieures \u00e0 9.3", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS Sierra sans la mise \u00e0 jour de s\u00e9curite 2018-002 Sierra", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.4", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "tvOS versions ant\u00e9rieures \u00e0 11.3", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-4158", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4158" }, { "name": "CVE-2018-4163", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4163" }, { "name": "CVE-2018-4142", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4142" }, { "name": "CVE-2018-4138", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4138" }, { "name": "CVE-2018-4114", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4114" }, { "name": "CVE-2018-4125", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4125" }, { "name": "CVE-2018-4135", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4135" }, { "name": "CVE-2018-4101", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4101" }, { "name": "CVE-2018-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4104" }, { "name": "CVE-2018-4154", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4154" }, { "name": "CVE-2018-4117", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4117" }, { "name": "CVE-2018-4121", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4121" }, { "name": "CVE-2018-4174", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4174" }, { "name": "CVE-2018-4118", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4118" }, { "name": "CVE-2018-4110", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4110" }, { "name": "CVE-2017-13890", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13890" }, { "name": "CVE-2018-4134", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4134" }, { "name": "CVE-2018-4107", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4107" }, { "name": "CVE-2018-4161", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4161" }, { "name": "CVE-2018-4172", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4172" }, { "name": "CVE-2018-4152", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4152" }, { "name": "CVE-2018-4164", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4164" }, { "name": "CVE-2018-4119", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4119" }, { "name": "CVE-2018-4156", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4156" }, { "name": "CVE-2018-4106", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4106" }, { "name": "CVE-2018-4132", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4132" }, { "name": "CVE-2018-4127", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4127" }, { "name": "CVE-2018-4149", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4149" }, { "name": "CVE-2018-4108", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4108" }, { "name": "CVE-2018-4130", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4130" }, { "name": "CVE-2018-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4136" }, { "name": "CVE-2018-4150", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4150" }, { "name": "CVE-2017-8816", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8816" }, { "name": "CVE-2018-4139", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4139" }, { "name": "CVE-2018-4162", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4162" }, { "name": "CVE-2018-4122", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4122" }, { "name": "CVE-2018-4140", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4140" }, { "name": "CVE-2018-4144", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4144" }, { "name": "CVE-2018-4115", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4115" }, { "name": "CVE-2018-4128", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4128" }, { "name": "CVE-2018-4105", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4105" }, { "name": "CVE-2018-4102", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4102" }, { "name": "CVE-2018-4146", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4146" }, { "name": "CVE-2018-4113", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4113" }, { "name": "CVE-2018-4143", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4143" }, { "name": "CVE-2018-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4155" }, { "name": "CVE-2018-4160", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4160" }, { "name": "CVE-2018-4123", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4123" }, { "name": "CVE-2018-4131", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4131" }, { "name": "CVE-2018-4129", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4129" }, { "name": "CVE-2018-4176", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4176" }, { "name": "CVE-2018-4120", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4120" }, { "name": "CVE-2018-4137", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4137" }, { "name": "CVE-2018-4157", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4157" }, { "name": "CVE-2018-4175", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4175" }, { "name": "CVE-2018-4166", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4166" }, { "name": "CVE-2018-4167", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4167" }, { "name": "CVE-2018-4170", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4170" }, { "name": "CVE-2018-4151", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4151" }, { "name": "CVE-2018-4133", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4133" }, { "name": "CVE-2018-4116", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4116" }, { "name": "CVE-2018-4165", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4165" }, { "name": "CVE-2018-4111", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4111" }, { "name": "CVE-2018-4112", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4112" }, { "name": "CVE-2018-4168", "url": "https://www.cve.org/CVERecord?id=CVE-2018-4168" } ], "initial_release_date": "2018-03-30T00:00:00", "last_revision_date": "2018-03-30T00:00:00", "links": [], "reference": "CERTFR-2018-AVI-162", "revisions": [ { "description": "Version initiale", "revision_date": "2018-03-30T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208696 du 29 mars 2018", "url": "https://support.apple.com/en-us/HT208696" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208692 du 29 mars 2018", "url": "https://support.apple.com/en-us/HT208692" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208697 du 29 mars 2018", "url": "https://support.apple.com/en-us/HT208697" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208695 du 29 mars 2018", "url": "https://support.apple.com/en-us/HT208695" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208694 du 29 mars 2018", "url": "https://support.apple.com/en-us/HT208694" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208698 du 29 mars 2018", "url": "https://support.apple.com/en-us/HT208698" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208699 du 29 mars 2018", "url": "https://support.apple.com/en-us/HT208699" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208693 du 29 mars 2018", "url": "https://support.apple.com/en-us/HT208693" } ] }
cnvd-2018-08308
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://www.apple.com/ http://www.apple.com/safari/ https://support.apple.com/en-ie/HT208695
Name | Apple Safari <11.1 |
---|
{ "bids": { "bid": { "bidNumber": "103580" } }, "cves": { "cve": { "cveNumber": "CVE-2018-4102" } }, "description": "Apple Safari\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\uff0c\u662fMac OS X\u548ciOS\u64cd\u4f5c\u7cfb\u7edf\u9644\u5e26\u7684\u9ed8\u8ba4\u6d4f\u89c8\u5668\u3002Safari\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7528\u4e8eSafari\u6d4f\u89c8\u5668\u7684\u4e13\u7528\u7ec4\u4ef6\u3002\r\n\r\nApple Safari 11.1\u4e4b\u524d\u7248\u672c\u4e2d\u7684Safari\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u7f51\u7ad9\u5229\u7528\u8be5\u6f0f\u6d1e\u4f2a\u9020\u5730\u5740\u680f\u5185\u5bb9\u3002", "discovererName": "Kai Zhao of 3H security team", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://www.apple.com/\r\nhttp://www.apple.com/safari/\r\nhttps://support.apple.com/en-ie/HT208695", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-08308", "openTime": "2018-04-25", "patchDescription": "Apple Safari\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\uff0c\u662fMac OS X\u548ciOS\u64cd\u4f5c\u7cfb\u7edf\u9644\u5e26\u7684\u9ed8\u8ba4\u6d4f\u89c8\u5668\u3002Safari\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7528\u4e8eSafari\u6d4f\u89c8\u5668\u7684\u4e13\u7528\u7ec4\u4ef6\u3002\r\n\r\nApple Safari 11.1\u4e4b\u524d\u7248\u672c\u4e2d\u7684Safari\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u7f51\u7ad9\u5229\u7528\u8be5\u6f0f\u6d1e\u4f2a\u9020\u5730\u5740\u680f\u5185\u5bb9\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Apple Safari\u5185\u5bb9\u4f2a\u9020\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Apple Safari \u003c11.1" }, "referenceLink": "http://www.securityfocus.com/bid/103580", "serverity": "\u4e2d", "submitTime": "2018-04-08", "title": "Apple Safari\u5185\u5bb9\u4f2a\u9020\u6f0f\u6d1e" }
fkie_cve-2018-4102
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
product-security@apple.com | http://www.securityfocus.com/bid/103580 | Third Party Advisory, VDB Entry | |
product-security@apple.com | http://www.securitytracker.com/id/1040606 | Third Party Advisory, VDB Entry | |
product-security@apple.com | https://support.apple.com/HT208695 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103580 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040606 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208695 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "matchCriteriaId": "2683E773-F7E6-4B5A-B341-F34EC83368BB", "versionEndExcluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site." }, { "lang": "es", "value": "Se ha descubierto un problema en algunos productos Apple. Se ha visto afectado Safari en versiones anteriores a la 11,1. El problema afecta al componente \"Safari\". Permite que atacantes remotos suplanten la barra de direcciones mediante un sitio web manipulado." } ], "id": "CVE-2018-4102", "lastModified": "2024-11-21T04:06:46.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-03T06:29:04.077", "references": [ { "source": "product-security@apple.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103580" }, { "source": "product-security@apple.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040606" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT208695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT208695" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-4102
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-4102", "description": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site.", "id": "GSD-2018-4102" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-4102" ], "details": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site.", "id": "GSD-2018-4102", "modified": "2023-12-13T01:22:28.608108Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2018-4102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "103580", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103580" }, { "name": "1040606", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040606" }, { "name": "https://support.apple.com/HT208695", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208695" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2018-4102" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208695", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT208695" }, { "name": "1040606", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040606" }, { "name": "103580", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103580" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2018-05-01T15:38Z", "publishedDate": "2018-04-03T06:29Z" } } }
var-201804-1215
Vulnerability from variot
An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar via a crafted web site. Apple Safari is prone to is prone to multiple security vulnerabilities. These issues may allow a remote attacker to carry out phishing-style attacks. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2018-3-29-6 Safari 11.1
Safari 11.1 is now available and addresses the following:
Safari Available for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.4 Impact: Visiting a malicious website may lead to address bar spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2018-4102: Kai Zhao of 3H security team CVE-2018-4116: @littlelailo, xisigr of Tencent's Xuanwu Lab (tencent.com)
Safari Login AutoFill Available for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.4 Impact: A malicious website may be able to exfiltrate autofilled data in Safari without explicit user interaction. Description: Safari autofill did not require explicit user interaction before taking place. The issue was addressed through improved autofill heuristics. CVE-2018-4137:
WebKit Available for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.4 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2018-4101: Yuan Deng of Ant-financial Light-Year Security Lab CVE-2018-4114: found by OSS-Fuzz CVE-2018-4118: Jun Kokatsu (@shhnjk) CVE-2018-4119: an anonymous researcher working with Trend Micro's Zero Day Initiative CVE-2018-4120: Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan Team CVE-2018-4121: Natalie Silvanovich of Google Project Zero CVE-2018-4122: WanderingGlitch of Trend Micro's Zero Day Initiative CVE-2018-4125: WanderingGlitch of Trend Micro's Zero Day Initiative CVE-2018-4127: an anonymous researcher working with Trend Micro's Zero Day Initiative CVE-2018-4128: Zach Markley CVE-2018-4129: likemeng of Baidu Security Lab working with Trend Micro's Zero Day Initiative CVE-2018-4130: Omair working with Trend Micro's Zero Day Initiative CVE-2018-4161: WanderingGlitch of Trend Micro's Zero Day Initiative CVE-2018-4162: WanderingGlitch of Trend Micro's Zero Day Initiative CVE-2018-4163: WanderingGlitch of Trend Micro's Zero Day Initiative CVE-2018-4165: Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan Team
WebKit Available for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.4 Impact: Unexpected interaction with indexing types causing an ASSERT failure Description: An array indexing issue existed in the handling of a function in javascript core. This issue was addressed through improved checks. CVE-2018-4113: found by OSS-Fuzz
WebKit Available for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.4 Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack Description: A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. CVE-2018-4133: Anton Lopanitsyn of Wallarm, Linus SA$?rud of Detectify (detectify.com), Yuji Tounai of NTT Communications Corporation
WebKit Available for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.4 Impact: Processing maliciously crafted web content may lead to a denial of service Description: A memory corruption issue was addressed through improved input validation. CVE-2018-4146: found by OSS-Fuzz
WebKit Available for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.4 Impact: A malicious website may exfiltrate data cross-origin Description: A cross-origin issue existed with the fetch API. This was addressed through improved input validation. CVE-2018-4117: an anonymous researcher, an anonymous researcher
Additional recognition
WebKit We would like to acknowledge Johnny Nipper of Tinder Security Team for their assistance.
Installation note:
Safari 11.1 may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAlq9Gl8pHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEYFUQ// QO1Al/D5ErPzNtbiQEnmPD4O5JMl/mz+ztGEkncEBWZiq9/4X0B1WLr+Ve/hF4l2 mkDPU2EEcPTg/pDvyeYnh4xKCcCScgUHpwdqAmtECG4C59IH+uL1PCbi2UDVZ6Jg W/xpP3DFykn1e2/R5ZE1iObZc+jLz5Rta3k0/Z0v5YhXY7x+vtMhSMh3HTPhy28T eoHRY0W9iWZUCkuKV0ugCGGsnrx5awbz4rHBdGCewEWeUrk5+h6Mwo6sJTAoO+0E nVKdRu0hvU1RzZSn3eiLSvo5qVNNT6bK7hf1P3eMUdJ7e5/unIIE6WXo8ox5iyRB sdNqI8K/HuBzcpKggXFAjVce+CDc5LVd2Kf1g/ymqejHqGp3VEhGY8FwJRTFBenm svzGQLGAFpg2bl3oKt9RCfQG/NGWjg2HTgp4eHDqEeqkQNENxjDAMYYm3Z7O2ODI JzaHXunbltbUNzgzfUzfGX/xtDmnNczijYd1vpIc9C1l0nv620HW3aOqv1vP2bxT JQFWwoZiJ7plmgRXLzBR2lvcyEfNWOE466yF+QIo5iBWOeGrBZqb5dYkqEskrDFk 4ju2DsG61j+aK5flU5C7Z6JZLGVBEOm+2OuUu+O4+aboHV0mEDcitl7RUFUWfW2d p5479DG4FgkWaZZH9I7eC2xMrPDspLU7Jscg6UCpeyQ= =D/co -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201804-1215", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "safari", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "11.1" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "5.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "5.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "5.0.6" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "5.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "5.1" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "5.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "5.0.4" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "11.1 (macos high sierra 10.13.4)" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "11.1 (macos sierra 10.12.6)" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "11.1 (os x el capitan 10.11.6)" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.7" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.8" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.31" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.7" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.4" }, { "model": "webkit", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.34" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.1" }, { "model": "macos", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.13.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.8" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.52" }, { "model": "safari", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "11.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.31" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.28" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.3.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.3" }, { "model": "macos", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.12.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2.7" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.33" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2.8" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.30" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.10" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.7" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.3.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" } ], "sources": [ { "db": "BID", "id": "103580" }, { "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "db": "CNNVD", "id": "CNNVD-201804-202" }, { "db": "NVD", "id": "CVE-2018-4102" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003677" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kai Zhao of 3H security team and Anton Lopanitsyn of Wallarm, Linus S\u00e4rud of Detectify (detectify.com), Yuji Tounai of NTT Communications Corporation", "sources": [ { "db": "BID", "id": "103580" } ], "trust": 0.3 }, "cve": "CVE-2018-4102", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2018-4102", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-134133", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2018-4102", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-4102", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-4102", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201804-202", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-134133", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-4102", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-134133" }, { "db": "VULMON", "id": "CVE-2018-4102" }, { "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "db": "CNNVD", "id": "CNNVD-201804-202" }, { "db": "NVD", "id": "CVE-2018-4102" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the \"Safari\" component. It allows remote attackers to spoof the address bar via a crafted web site. Apple Safari is prone to is prone to multiple security vulnerabilities. These issues may allow a remote attacker to carry out phishing-style attacks. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2018-3-29-6 Safari 11.1\n\nSafari 11.1 is now available and addresses the following:\n\nSafari\nAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and\nmacOS High Sierra 10.13.4\nImpact: Visiting a malicious website may lead to address bar spoofing\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2018-4102: Kai Zhao of 3H security team\nCVE-2018-4116: @littlelailo, xisigr of Tencent\u0027s Xuanwu Lab\n(tencent.com)\n\nSafari Login AutoFill\nAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and\nmacOS High Sierra 10.13.4\nImpact: A malicious website may be able to exfiltrate autofilled data\nin Safari without explicit user interaction. \nDescription: Safari autofill did not require explicit user\ninteraction before taking place. The issue was addressed through\nimproved autofill heuristics. \nCVE-2018-4137:\n\nWebKit\nAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and\nmacOS High Sierra 10.13.4\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2018-4101: Yuan Deng of Ant-financial Light-Year Security Lab\nCVE-2018-4114: found by OSS-Fuzz\nCVE-2018-4118: Jun Kokatsu (@shhnjk)\nCVE-2018-4119: an anonymous researcher working with Trend Micro\u0027s\nZero Day Initiative\nCVE-2018-4120: Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan Team\nCVE-2018-4121: Natalie Silvanovich of Google Project Zero\nCVE-2018-4122: WanderingGlitch of Trend Micro\u0027s Zero Day Initiative\nCVE-2018-4125: WanderingGlitch of Trend Micro\u0027s Zero Day Initiative\nCVE-2018-4127: an anonymous researcher working with Trend Micro\u0027s\nZero Day Initiative\nCVE-2018-4128: Zach Markley\nCVE-2018-4129: likemeng of Baidu Security Lab working with Trend\nMicro\u0027s Zero Day Initiative\nCVE-2018-4130: Omair working with Trend Micro\u0027s Zero Day Initiative\nCVE-2018-4161: WanderingGlitch of Trend Micro\u0027s Zero Day Initiative\nCVE-2018-4162: WanderingGlitch of Trend Micro\u0027s Zero Day Initiative\nCVE-2018-4163: WanderingGlitch of Trend Micro\u0027s Zero Day Initiative\nCVE-2018-4165: Hanming Zhang (@4shitak4) of Qihoo 360 Vulcan Team\n\nWebKit\nAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and\nmacOS High Sierra 10.13.4\nImpact: Unexpected interaction with indexing types causing an ASSERT\nfailure\nDescription: An array indexing issue existed in the handling of a\nfunction in javascript core. This issue was addressed through\nimproved checks. \nCVE-2018-4113: found by OSS-Fuzz\n\nWebKit\nAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and\nmacOS High Sierra 10.13.4\nImpact: Visiting a maliciously crafted website may lead to a\ncross-site scripting attack\nDescription: A cross-site scripting issue existed in Safari. This\nissue was addressed with improved URL validation. \nCVE-2018-4133: Anton Lopanitsyn of Wallarm, Linus SA$?rud of Detectify\n(detectify.com), Yuji Tounai of NTT Communications Corporation\n\nWebKit\nAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and\nmacOS High Sierra 10.13.4\nImpact: Processing maliciously crafted web content may lead to a\ndenial of service\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2018-4146: found by OSS-Fuzz\n\nWebKit\nAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and\nmacOS High Sierra 10.13.4\nImpact: A malicious website may exfiltrate data cross-origin\nDescription: A cross-origin issue existed with the fetch API. This\nwas addressed through improved input validation. \nCVE-2018-4117: an anonymous researcher, an anonymous researcher\n\nAdditional recognition\n\nWebKit\nWe would like to acknowledge Johnny Nipper of Tinder Security Team\nfor their assistance. \n\nInstallation note:\n\nSafari 11.1 may be obtained from the Mac App Store. \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\np5479DG4FgkWaZZH9I7eC2xMrPDspLU7Jscg6UCpeyQ=\n=D/co\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2018-4102" }, { "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "db": "BID", "id": "103580" }, { "db": "VULHUB", "id": "VHN-134133" }, { "db": "VULMON", "id": "CVE-2018-4102" }, { "db": "PACKETSTORM", "id": "146969" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-4102", "trust": 3.0 }, { "db": "BID", "id": "103580", "trust": 1.5 }, { "db": "SECTRACK", "id": "1040606", "trust": 1.2 }, { "db": "JVN", "id": "JVNVU92378299", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-003677", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-202", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-134133", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-4102", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146969", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-134133" }, { "db": "VULMON", "id": "CVE-2018-4102" }, { "db": "BID", "id": "103580" }, { "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "db": "PACKETSTORM", "id": "146969" }, { "db": "CNNVD", "id": "CNNVD-201804-202" }, { "db": "NVD", "id": "CVE-2018-4102" } ] }, "id": "VAR-201804-1215", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-134133" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:01:42.232000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT208695", "trust": 0.8, "url": "https://support.apple.com/en-us/HT208695" }, { "title": "HT208695", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT208695" }, { "title": "Apple Safari Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83054" }, { "title": "Apple: Safari 11.1", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=ee3f60ca20e25abaeeaa2929b7de559a" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-4102" }, { "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "db": "CNNVD", "id": "CNNVD-201804-202" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-134133" }, { "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "db": "NVD", "id": "CVE-2018-4102" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://support.apple.com/ht208695" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/103580" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1040606" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4102" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4102" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu92378299/index.html" }, { "trust": 0.3, "url": "https://www.apple.com/" }, { "trust": 0.3, "url": "http://www.apple.com/safari/" }, { "trust": 0.3, "url": "https://support.apple.com/en-ie/ht208695" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht208695" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4101" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4114" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4161" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4120" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4163" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4127" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4165" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4162" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4125" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4128" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4121" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4118" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4113" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4116" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4133" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4122" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4117" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4137" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4119" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4130" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4146" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4129" } ], "sources": [ { "db": "VULHUB", "id": "VHN-134133" }, { "db": "VULMON", "id": "CVE-2018-4102" }, { "db": "BID", "id": "103580" }, { "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "db": "PACKETSTORM", "id": "146969" }, { "db": "CNNVD", "id": "CNNVD-201804-202" }, { "db": "NVD", "id": "CVE-2018-4102" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-134133" }, { "db": "VULMON", "id": "CVE-2018-4102" }, { "db": "BID", "id": "103580" }, { "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "db": "PACKETSTORM", "id": "146969" }, { "db": "CNNVD", "id": "CNNVD-201804-202" }, { "db": "NVD", "id": "CVE-2018-4102" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-03T00:00:00", "db": "VULHUB", "id": "VHN-134133" }, { "date": "2018-04-03T00:00:00", "db": "VULMON", "id": "CVE-2018-4102" }, { "date": "2018-03-29T00:00:00", "db": "BID", "id": "103580" }, { "date": "2018-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "date": "2018-03-30T15:55:24", "db": "PACKETSTORM", "id": "146969" }, { "date": "2018-04-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-202" }, { "date": "2018-04-03T06:29:04.077000", "db": "NVD", "id": "CVE-2018-4102" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-01T00:00:00", "db": "VULHUB", "id": "VHN-134133" }, { "date": "2018-05-01T00:00:00", "db": "VULMON", "id": "CVE-2018-4102" }, { "date": "2018-03-29T00:00:00", "db": "BID", "id": "103580" }, { "date": "2018-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003677" }, { "date": "2018-04-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-202" }, { "date": "2024-11-21T04:06:46.167000", "db": "NVD", "id": "CVE-2018-4102" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-202" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Safari of Safari Component address bar spoofing vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003677" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-202" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.