var-200603-0283
Vulnerability from variot

Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows attackers to trick a user into opening an application that appears to be a safe file type. NOTE: due to the lack of specific information in the vendor advisory, it is not clear how CVE-2006-0397, CVE-2006-0398, and CVE-2006-0399 are different. Apple Safari fails to properly determine file safety, allowing a remote unauthenticated attacker to execute arbitrary commands or code. Commands would be executed in the context of the user opening the archive file. Attackers can reportedly use Safari and Apple Mail as exploitation vectors for this vulnerability. Mac OS X 10.4.5 is reported to be vulnerable. Earlier versions may also be affected. There is an issue in Safari's handling of automatic opening of downloaded files. Due to this default configuration and inconsistencies in Safari and OS X's security files, Safari may execute arbitrary shell commands if a specially crafted page is viewed.

TITLE: Mac OS X "__MACOSX" ZIP Archive Shell Script Execution

SECUNIA ADVISORY ID: SA18963

VERIFY ADVISORY: http://secunia.com/advisories/18963/

CRITICAL: Extremely critical

IMPACT: System access

WHERE:

From remote

OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/

DESCRIPTION: Michael Lehn has discovered a vulnerability in Mac OS X, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error in the processing of file association meta data (stored in the "__MACOSX" folder) in ZIP archives. This can be exploited to trick users into executing a malicious shell script renamed to a safe file extension stored in a ZIP archive.

This can also be exploited automatically via the Safari browser when visiting a malicious web site.

Secunia has constructed a test, which can be used to check if your system is affected by this issue: http://secunia.com/mac_os_x_command_execution_vulnerability_test/

The vulnerability has been confirmed on a fully patched system with Safari 2.0.3 (417.8) and Mac OS X 10.4.5.

SOLUTION: The vulnerability can be mitigated by disabling the "Open safe files after downloading" option in Safari.

Do not open files in ZIP archives originating from untrusted sources.

PROVIDED AND/OR DISCOVERED BY: Michael Lehn


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200603-0283",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.5"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.4"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.4.3"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.4.3"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0398"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michael Lehn",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-0398",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2006-0398",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-16506",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-0398",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#999708",
            "trust": 0.8,
            "value": "35.44"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200603-248",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-16506",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16506"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0398"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows attackers to trick a user into opening an application that appears to be a safe file type. NOTE: due to the lack of specific information in the vendor advisory, it is not clear how CVE-2006-0397, CVE-2006-0398, and CVE-2006-0399 are different. Apple Safari fails to properly determine file safety, allowing a remote unauthenticated attacker to execute arbitrary commands or code. Commands would be executed in the context of the user opening the archive file. \nAttackers can reportedly use Safari and Apple Mail as exploitation vectors for this vulnerability. \nMac OS X 10.4.5 is reported to be vulnerable. Earlier versions may also be affected. There is an issue in Safari\u0027s handling of automatic opening of downloaded files. Due to this default configuration and inconsistencies in Safari and OS X\u0027s security files, Safari may execute arbitrary shell commands if a specially crafted page is viewed. \n\nTITLE:\nMac OS X \"__MACOSX\" ZIP Archive Shell Script Execution\n\nSECUNIA ADVISORY ID:\nSA18963\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/18963/\n\nCRITICAL:\nExtremely critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nApple Macintosh OS X\nhttp://secunia.com/product/96/\n\nDESCRIPTION:\nMichael Lehn has discovered a vulnerability in Mac OS X, which can be\nexploited by malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to an error in the processing of file\nassociation meta data (stored in the \"__MACOSX\" folder) in ZIP\narchives. This can be exploited to trick users into executing a\nmalicious shell script renamed to a safe file extension stored in a\nZIP archive. \n\nThis can also be exploited automatically via the Safari browser when\nvisiting a malicious web site. \n\nSecunia has constructed a test, which can be used to check if your\nsystem is affected by this issue:\nhttp://secunia.com/mac_os_x_command_execution_vulnerability_test/\n\nThe vulnerability has been confirmed on a fully patched system with\nSafari 2.0.3 (417.8) and Mac OS X 10.4.5. \n\nSOLUTION:\nThe vulnerability can be mitigated by disabling the \"Open safe files\nafter downloading\" option in Safari. \n\nDo not open files in ZIP archives originating from untrusted sources. \n\nPROVIDED AND/OR DISCOVERED BY:\nMichael Lehn\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0398"
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16506"
      },
      {
        "db": "PACKETSTORM",
        "id": "44037"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-0398",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "19129",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "23870",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-0949",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015760",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "16736",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "18963",
        "trust": 0.9
      },
      {
        "db": "XF",
        "id": "24808",
        "trust": 0.8
      },
      {
        "db": "SECTRACK",
        "id": "1015652",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248",
        "trust": 0.7
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2006-03-13",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "25269",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-16506",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "44037",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16506"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "PACKETSTORM",
        "id": "44037"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0398"
      }
    ]
  },
  "id": "VAR-200603-0283",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16506"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-29T21:28:15.741000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-94",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16506"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0398"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://docs.info.apple.com/article.html?artnum=303453"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2006/mar/msg00001.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/23870"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015760"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/19129"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/0949"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25269"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/18963/"
      },
      {
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=303382"
      },
      {
        "trust": 0.8,
        "url": "http://www.mathematik.uni-ulm.de/numerik/staff/lehn/macosx.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.heise.de/english/newsticker/news/69862"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/documentation/carbon/conceptual/launchservicesconcepts/lscconcepts/chapter_2_section_8.html"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/technotes/tn/tn2017.html"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/documentation/mac/moretoolbox/moretoolbox-11.html"
      },
      {
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=108009"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/16736"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/24808"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0397"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0398"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0399"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2006/feb/1015652.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/0949"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/25269"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/mac_os_x_command_execution_vulnerability_test/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16506"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "PACKETSTORM",
        "id": "44037"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0398"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16506"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "PACKETSTORM",
        "id": "44037"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0398"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-02-21T00:00:00",
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "date": "2006-03-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-16506"
      },
      {
        "date": "2006-02-21T00:00:00",
        "db": "BID",
        "id": "16736"
      },
      {
        "date": "2006-02-21T20:14:58",
        "db": "PACKETSTORM",
        "id": "44037"
      },
      {
        "date": "2006-02-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      },
      {
        "date": "2006-03-14T11:02:00",
        "db": "NVD",
        "id": "CVE-2006-0398"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-12-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "date": "2017-07-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-16506"
      },
      {
        "date": "2016-07-06T14:40:00",
        "db": "BID",
        "id": "16736"
      },
      {
        "date": "2006-03-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      },
      {
        "date": "2024-11-21T00:06:22.177000",
        "db": "NVD",
        "id": "CVE-2006-0398"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Safari automatically executes arbitrary shell commands or code",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200603-248"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…