CVE-2010-1029 (GCVE-0-2010-1029)
Vulnerability from cvelistv5
Published
2010-03-19 21:00
Modified
2024-08-07 01:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack consumption vulnerability in the WebCore::CSSSelector function in WebKit, as used in Apple Safari 4.0.4, Apple Safari on iPhone OS and iPhone OS for iPod touch, and Google Chrome 4.0.249, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a STYLE element composed of a large number of *> sequences.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:06:52.788Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "safari-chrome-css-bo(56524)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56524"
},
{
"name": "43068",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43068"
},
{
"name": "11574",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/11574"
},
{
"name": "11567",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/11567"
},
{
"name": "38398",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38398"
},
{
"name": "ADV-2011-0212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "webkit-cssselector-dos(56527)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56527"
},
{
"name": "SUSE-SR:2011:002",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:14301",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14301"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-02-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack consumption vulnerability in the WebCore::CSSSelector function in WebKit, as used in Apple Safari 4.0.4, Apple Safari on iPhone OS and iPhone OS for iPod touch, and Google Chrome 4.0.249, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a STYLE element composed of a large number of *\u003e sequences."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "safari-chrome-css-bo(56524)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56524"
},
{
"name": "43068",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43068"
},
{
"name": "11574",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/11574"
},
{
"name": "11567",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/11567"
},
{
"name": "38398",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38398"
},
{
"name": "ADV-2011-0212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "webkit-cssselector-dos(56527)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56527"
},
{
"name": "SUSE-SR:2011:002",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:14301",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14301"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1029",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack consumption vulnerability in the WebCore::CSSSelector function in WebKit, as used in Apple Safari 4.0.4, Apple Safari on iPhone OS and iPhone OS for iPod touch, and Google Chrome 4.0.249, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a STYLE element composed of a large number of *\u003e sequences."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "safari-chrome-css-bo(56524)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56524"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "11574",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11574"
},
{
"name": "11567",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11567"
},
{
"name": "38398",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38398"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "webkit-cssselector-dos(56527)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56527"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:14301",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14301"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-1029",
"datePublished": "2010-03-19T21:00:00",
"dateReserved": "2010-03-19T00:00:00",
"dateUpdated": "2024-08-07T01:06:52.788Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2010-1029\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-03-19T21:30:00.327\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack consumption vulnerability in the WebCore::CSSSelector function in WebKit, as used in Apple Safari 4.0.4, Apple Safari on iPhone OS and iPhone OS for iPod touch, and Google Chrome 4.0.249, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a STYLE element composed of a large number of *\u003e sequences.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de consumo en la pila en la funci\u00f3n WebCore:: CSSSelector en WebKit, utilizado en Apple Safari v4.0.4, Apple Safari en iPhone OS y iPhone OS para iPod touch, y Google Chrome v4.0.249, permite a tacantes remotos provocar una denegaci\u00f3n de servicio(ca\u00edda de aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un elemento STYLE compuesto de un n\u00famero largo de secuencias *\u003e\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E9C17F-C99E-4ABB-B312-31F87BC0C0E8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:4.0.249.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CD2980F-A2B4-4EEE-90ED-5CFF4C29AA99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE370CAA-04B3-434E-BD5B-1D87DE596C10\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"340C4071-1447-477F-942A-8E09EA29F917\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41DB23F0-7226-4D0B-A3FA-A801F02EBA6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"B669868B-F358-4D5B-9D64-4A462F261553\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28FB0CB-D636-4F85-B5F7-70EC30053925\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"A14B31DE-AA3D-4FA2-A4F4-0A6A51AFA7FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4AEDE82-E317-4066-A34F-BB3BCD3F53E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC16D1C-065A-4D1A-BA6E-528A71DF65CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"4261E5C1-DC93-437E-B84F-A30380AFDC40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"079BB54C-25FD-4B26-B171-368911960F76\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27319629-171F-42AA-A95F-2D71F78097D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"DF292FED-19A4-4031-9B1F-151C0146F3B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"5183082C-556F-479F-9FC1-42B59BBB840B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"AAC3FBF0-F128-412D-9FD5-13BB2EB92DD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297F9438-0F04-4128-94A8-A504B600929E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"2FFCFEA4-C5E2-4C46-B8C3-ADCDBA4B85EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"7E7AA027-8CF9-49BD-A000-82880E41D622\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8618621-F871-4531-9F6C-7D60F2BF8B75\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"4FA51920-223B-4DF4-802C-188F5A8B0563\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"4385635D-46F2-4642-9C78-1346DC120492\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824DED2D-FA1D-46FC-8252-6E25546DAE29\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"2C63C36E-1997-4F44-80AD-E665CE46A278\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"20DAE911-C037-4F10-82A3-EF42D5FB71D8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1641DDFA-3BF1-467F-8EC3-98114FF9F07B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF40CDA4-4716-4815-9ED0-093FE266734C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"02BFDD6F-B9C3-42BB-A84A-828193FAA137\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"0A66D6DC-9A48-4BD6-9E01-0D9FF388457C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"CFD4325B-A86A-4C1B-930F-56C17FB6281D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"C59B8C50-BF5D-4E9A-8E5B-99B34E974B5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D06D54D-97FD-49FD-B251-CC86FBA68CA6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"2904DEFA-7769-43DB-B3D0-B552AE8F06A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"D4CE4199-BBF5-4F42-8BBC-BD946079C912\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A5D868-0016-44AB-80E6-E5DF91F15455\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"0AD5106E-CD7C-4952-A9B1-5F72D99276E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"34346F55-4972-427B-8F96-780FA91DB95D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"B7235341-983F-4578-98DC-39BC278A7556\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"AE65CA8B-68CB-428C-AC32-6F9100F9E507\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"BA5C2D75-4019-45EB-8AF9-A850B5349507\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"AD136376-331D-494F-9D12-7E631546E8CB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863383DA-0BC6-4A96-835A-A96128EC0202\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"F07B3FE7-96B3-493A-A230-5642BA11FBDA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"4E2507AC-FD19-4A97-B91F-E45AF0C6BA4B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A20F171-79FE-43B9-8309-B18341639FA1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"52283848-67CC-4E4B-A849-1225F2BCBD9F\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/43068\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.exploit-db.com/exploits/11567\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.exploit-db.com/exploits/11574\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/38398\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0212\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56524\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56527\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14301\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43068\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.exploit-db.com/exploits/11567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.exploit-db.com/exploits/11574\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/38398\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0212\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56524\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14301\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…