var-201207-0099
Vulnerability from variot
WebKit in Apple Safari before 6.0 does not properly handle Cascading Style Sheets (CSS) property values, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. WebKit is prone to a remote information-disclosure vulnerability. Successful exploits may allow attackers to gain access to sensitive information. Information obtained may lead to further attacks. Note: This issue was previously discussed in BID 54669 (Apple Safari Prior to 6.0 Multiple Security Vulnerabilities), but has been given its own record to better document it. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. A remote attacker could exploit this vulnerability to bypass the same-origin policy via a specially crafted website
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0099", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "safari", "scope": "eq", "trust": 2.2, "vendor": "apple", "version": "5.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.9, "vendor": "apple", "version": "3.1.1" }, { "model": "safari", "scope": "eq", "trust": 1.9, "vendor": "apple", "version": "2.0.3" }, { "model": "safari", "scope": "eq", "trust": 1.9, "vendor": "apple", "version": "1.3.2" }, { "model": "safari", "scope": "eq", "trust": 1.9, "vendor": "apple", "version": "4.1" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.0.6" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.1.4" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.1.1" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.1" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.0.5" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.0.4" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0.4" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "1.0.3" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "5.1.6" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "5.1.5" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "4.0.4" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "4.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "3.1.2" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "2.0.4" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "2.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "2.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.3.1" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.3" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.2" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.0" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "5.1.3" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "5.1.2" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "4.1.2" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "4.1.1" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "4.0" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "3" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.2b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.1b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.0b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.1b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.3" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.4" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0b2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.5" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.2b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.4b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0b1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.0b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.2b" }, { "model": "safari", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "5.1.7" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.3b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.0b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.1b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0b1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.0b" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.1" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6 (ipad" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "ipad 2)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6 (iphone 3gs" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "iphone 4" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "iphone 4s)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6 (ipod touch first 3 after generation )" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6.0 (mac os)" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "5.1.7" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "1.2.5" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "1.2.3" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "1.2.2" }, { "model": "open source project webkit r82222", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r77705", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r52833", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r52401", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r51295", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r38566", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r105591", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "2" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "1.2.x" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "1.2.2-1" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "0" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.7" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.5" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.6" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.5" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.4" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.3" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.3" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.2" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.2" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.1" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.1" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3" } ], "sources": [ { "db": "BID", "id": "54687" }, { "db": "BID", "id": "78161" }, { "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "db": "CNNVD", "id": "CNNVD-201207-457" }, { "db": "NVD", "id": "CVE-2012-3691" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:iphone_os", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003314" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "BID", "id": "54687" } ], "trust": 0.3 }, "cve": "CVE-2012-3691", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2012-3691", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-56972", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-3691", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-3691", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201207-457", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-56972", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-56972" }, { "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "db": "CNNVD", "id": "CNNVD-201207-457" }, { "db": "NVD", "id": "CVE-2012-3691" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebKit in Apple Safari before 6.0 does not properly handle Cascading Style Sheets (CSS) property values, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. WebKit is prone to a remote information-disclosure vulnerability. \nSuccessful exploits may allow attackers to gain access to sensitive information. Information obtained may lead to further attacks. \nNote: This issue was previously discussed in BID 54669 (Apple Safari Prior to 6.0 Multiple Security Vulnerabilities), but has been given its own record to better document it. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. A remote attacker could exploit this vulnerability to bypass the same-origin policy via a specially crafted website", "sources": [ { "db": "NVD", "id": "CVE-2012-3691" }, { "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "db": "BID", "id": "54687" }, { "db": "BID", "id": "78161" }, { "db": "VULHUB", "id": "VHN-56972" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-3691", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2012-003314", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201207-457", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2012-07-25-1", "trust": 0.6 }, { "db": "NSFOCUS", "id": "20147", "trust": 0.6 }, { "db": "NSFOCUS", "id": "20166", "trust": 0.6 }, { "db": "BID", "id": "54687", "trust": 0.4 }, { "db": "BID", "id": "78161", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-56972", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-56972" }, { "db": "BID", "id": "54687" }, { "db": "BID", "id": "78161" }, { "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "db": "CNNVD", "id": "CNNVD-201207-457" }, { "db": "NVD", "id": "CVE-2012-3691" } ] }, "id": "VAR-201207-0099", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-56972" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:06:10.944000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2012-07-25-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html" }, { "title": "HT5503", "trust": 0.8, "url": "http://support.apple.com/kb/HT5503" }, { "title": "HT5400", "trust": 0.8, "url": "http://support.apple.com/kb/HT5400" }, { "title": "HT5400", "trust": 0.8, "url": "http://support.apple.com/kb/HT5400?viewlocale=ja_JP" }, { "title": "HT5503", "trust": 0.8, "url": "http://support.apple.com/kb/HT5503?viewlocale=ja_JP" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003314" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-56972" }, { "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "db": "NVD", "id": "CVE-2012-3691" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://lists.apple.com/archives/security-announce/2012/jul/msg00000.html" }, { "trust": 2.0, "url": "http://support.apple.com/kb/ht5400" }, { "trust": 1.4, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00003.html" }, { "trust": 1.4, "url": "http://support.apple.com/kb/ht5503" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3691" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu864819" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu624491/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3691" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/20166" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/20147" }, { "trust": 0.3, "url": "http://www.apple.com" }, { "trust": 0.3, "url": "http://www.webkit.org/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-56972" }, { "db": "BID", "id": "54687" }, { "db": "BID", "id": "78161" }, { "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "db": "CNNVD", "id": "CNNVD-201207-457" }, { "db": "NVD", "id": "CVE-2012-3691" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-56972" }, { "db": "BID", "id": "54687" }, { "db": "BID", "id": "78161" }, { "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "db": "CNNVD", "id": "CNNVD-201207-457" }, { "db": "NVD", "id": "CVE-2012-3691" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-25T00:00:00", "db": "VULHUB", "id": "VHN-56972" }, { "date": "2012-07-25T00:00:00", "db": "BID", "id": "54687" }, { "date": "2012-07-25T00:00:00", "db": "BID", "id": "78161" }, { "date": "2012-07-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "date": "2012-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-457" }, { "date": "2012-07-25T19:55:06.087000", "db": "NVD", "id": "CVE-2012-3691" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-09-22T00:00:00", "db": "VULHUB", "id": "VHN-56972" }, { "date": "2012-09-19T22:10:00", "db": "BID", "id": "54687" }, { "date": "2012-07-25T00:00:00", "db": "BID", "id": "78161" }, { "date": "2012-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003314" }, { "date": "2012-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-457" }, { "date": "2024-11-21T01:41:27.790000", "db": "NVD", "id": "CVE-2012-3691" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "54687" }, { "db": "BID", "id": "78161" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Apple Used in products WebKit Vulnerabilities that bypass the same origin policy", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003314" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201207-457" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.