var-200712-0445
Vulnerability from variot

Java in Mac OS X 10.4 through 10.4.11 allows remote attackers to bypass Keychain access controls and add or delete arbitrary Keychain items via a crafted Java applet. Apple Mac OS X Keychain is prone to a security-bypass vulnerability because it fails to properly validate user credentials before performing certain actions. This issue may stem from a security issue in Java. A successful attack allows unauthorized users to modify other users' accounts, which may aid in further attacks. This issue affects Mac OS X 10.4.10 and Mac OS X Server 10.4.10.


2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv


TITLE: Mac OS X Java Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA28115

VERIFY ADVISORY: http://secunia.com/advisories/28115/

CRITICAL: Highly critical

IMPACT: Security Bypass, Privilege escalation, DoS, System access

WHERE:

From remote

OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/

DESCRIPTION: Some vulnerabilities have been reported and acknowledged in Mac OS X, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, to cause a DoS (Denial of Service), or to compromise a user's system.

2) Some vulnerabilities in Java 1.4 and J2SE 5.0 can be exploited to bypass certain security restrictions, conduct cross-site scripting attacks, to cause a DoS (Denial of Service), or to compromise a user's system.

Java for Mac OS X 10.4, Release 6: http://www.apple.com/support/downloads/javaformacosx104release6.html

PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Bruno Harbulot, University of Manchester.

ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307177

OTHER REFERENCES: SA21709: http://secunia.com/advisories/21709/

SA23398: http://secunia.com/advisories/23398/

SA23445: http://secunia.com/advisories/23445/

SA23757: http://secunia.com/advisories/23757/

SA25069: http://secunia.com/advisories/25069/

SA25295: http://secunia.com/advisories/25295/

SA25769: http://secunia.com/advisories/25769/

SA25823: http://secunia.com/advisories/25823/

SA25981: http://secunia.com/advisories/25981/

SA26015: http://secunia.com/advisories/26015/

SA26402: http://secunia.com/advisories/26402/

SA27009: http://secunia.com/advisories/27009/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200712-0445",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.9"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.10"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.6"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.11"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.8"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.7"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.3"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.4.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.10"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "26877"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5862"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Bruno Harbulot of the University of Manchester is credited with discovering this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "26877"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2007-5862",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 9.4,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2007-5862",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 9.4,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-29224",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-5862",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-5862",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200712-212",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-29224",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29224"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5862"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Java in Mac OS X 10.4 through 10.4.11 allows remote attackers to bypass Keychain access controls and add or delete arbitrary Keychain items via a crafted Java applet. Apple Mac OS X Keychain is prone to a security-bypass vulnerability because it fails to properly validate user credentials before performing certain actions. \nThis issue may stem from a security issue in Java. \nA successful attack allows unauthorized users to modify other users\u0027 accounts, which may aid in further attacks. \nThis issue affects Mac OS X 10.4.10 and Mac OS X Server 10.4.10. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nGet a free trial of the Secunia Vulnerability Intelligence Solutions:\nhttp://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv\n\n----------------------------------------------------------------------\n\nTITLE:\nMac OS X Java Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28115\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28115/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSecurity Bypass, Privilege escalation, DoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nApple Macintosh OS X\nhttp://secunia.com/product/96/\n\nDESCRIPTION:\nSome vulnerabilities have been reported and acknowledged  in Mac OS\nX, which can be exploited by malicious people to bypass certain\nsecurity restrictions, conduct cross-site scripting attacks, to cause\na DoS (Denial of Service), or to compromise a user\u0027s system. \n\n2) Some vulnerabilities in Java 1.4 and J2SE 5.0 can be exploited to\nbypass certain security restrictions, conduct cross-site scripting\nattacks, to cause a DoS (Denial of Service), or to compromise a\nuser\u0027s system. \n\nJava for Mac OS X 10.4, Release 6:\nhttp://www.apple.com/support/downloads/javaformacosx104release6.html\n\nPROVIDED AND/OR DISCOVERED BY:\n1) The vendor credits Bruno Harbulot, University of Manchester. \n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=307177\n\nOTHER REFERENCES:\nSA21709:\nhttp://secunia.com/advisories/21709/\n\nSA23398:\nhttp://secunia.com/advisories/23398/\n\nSA23445:\nhttp://secunia.com/advisories/23445/\n\nSA23757:\nhttp://secunia.com/advisories/23757/\n\nSA25069:\nhttp://secunia.com/advisories/25069/\n\nSA25295:\nhttp://secunia.com/advisories/25295/\n\nSA25769:\nhttp://secunia.com/advisories/25769/\n\nSA25823:\nhttp://secunia.com/advisories/25823/\n\nSA25981:\nhttp://secunia.com/advisories/25981/\n\nSA26015:\nhttp://secunia.com/advisories/26015/\n\nSA26402:\nhttp://secunia.com/advisories/26402/\n\nSA27009:\nhttp://secunia.com/advisories/27009/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-5862"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "db": "BID",
        "id": "26877"
      },
      {
        "db": "VULHUB",
        "id": "VHN-29224"
      },
      {
        "db": "PACKETSTORM",
        "id": "61851"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-5862",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "26877",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "28115",
        "trust": 2.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-4224",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038",
        "trust": 0.8
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2007-12-14",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-29224",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "61851",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29224"
      },
      {
        "db": "BID",
        "id": "26877"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "db": "PACKETSTORM",
        "id": "61851"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5862"
      }
    ]
  },
  "id": "VAR-200712-0445",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29224"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T19:54:29.982000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Java for Mac OS X 10.4 Release 6",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=307177-en"
      },
      {
        "title": "Java for Mac OS X 10.4 Release 6",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=307177-ja"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29224"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5862"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/26877"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/28115"
      },
      {
        "trust": 1.8,
        "url": "http://docs.info.apple.com/article.html?artnum=307177"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2007/4224"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/4224"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5862"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5862"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/oss-sec/2016/q1/16"
      },
      {
        "trust": 0.3,
        "url": "http://software.cisco.com/download/navigator.html?mdfid=283613663"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/23398/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25823/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28115/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25295/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25069/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/javaformacosx104release6.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27009/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/21709/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/23757/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26402/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26015/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/23445/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25769/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25981/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29224"
      },
      {
        "db": "BID",
        "id": "26877"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "db": "PACKETSTORM",
        "id": "61851"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5862"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-29224"
      },
      {
        "db": "BID",
        "id": "26877"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "db": "PACKETSTORM",
        "id": "61851"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5862"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-12-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-29224"
      },
      {
        "date": "2007-12-14T00:00:00",
        "db": "BID",
        "id": "26877"
      },
      {
        "date": "2007-12-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "date": "2007-12-18T00:56:59",
        "db": "PACKETSTORM",
        "id": "61851"
      },
      {
        "date": "2007-12-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      },
      {
        "date": "2007-12-18T20:46:00",
        "db": "NVD",
        "id": "CVE-2007-5862"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-29224"
      },
      {
        "date": "2007-12-17T22:01:00",
        "db": "BID",
        "id": "26877"
      },
      {
        "date": "2007-12-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001038"
      },
      {
        "date": "2007-12-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      },
      {
        "date": "2024-11-21T00:38:52.263000",
        "db": "NVD",
        "id": "CVE-2007-5862"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS X Keychain Security Bypass Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "26877"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-212"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…