{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
affected_products: {
"@id": "https://www.variotdbs.pl/ref/affected_products",
},
configurations: {
"@id": "https://www.variotdbs.pl/ref/configurations",
},
credits: {
"@id": "https://www.variotdbs.pl/ref/credits",
},
cvss: {
"@id": "https://www.variotdbs.pl/ref/cvss/",
},
description: {
"@id": "https://www.variotdbs.pl/ref/description/",
},
exploit_availability: {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/",
},
external_ids: {
"@id": "https://www.variotdbs.pl/ref/external_ids/",
},
iot: {
"@id": "https://www.variotdbs.pl/ref/iot/",
},
iot_taxonomy: {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
},
patch: {
"@id": "https://www.variotdbs.pl/ref/patch/",
},
problemtype_data: {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/",
},
references: {
"@id": "https://www.variotdbs.pl/ref/references/",
},
sources: {
"@id": "https://www.variotdbs.pl/ref/sources/",
},
sources_release_date: {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/",
},
sources_update_date: {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/",
},
threat_type: {
"@id": "https://www.variotdbs.pl/ref/threat_type/",
},
title: {
"@id": "https://www.variotdbs.pl/ref/title/",
},
type: {
"@id": "https://www.variotdbs.pl/ref/type/",
},
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201208-0739",
affected_products: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
"@id": "https://www.variotdbs.pl/ref/sources",
},
},
data: [
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.6",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.2",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.5.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.7",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "1.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.4",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.5",
},
{
model: "goodreader",
scope: "eq",
trust: 1.6,
vendor: "goodiware",
version: "2.3",
},
{
model: "goodreader",
scope: "eq",
trust: 1.3,
vendor: "goodiware",
version: "3.15.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.13.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.2.3",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.0.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.10.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.3.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.9.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.5.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.10.3",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.14.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.15.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.4.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.14.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "2.8.2",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "2.8.4",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.1.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.2.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.9.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.11.1",
},
{
model: "goodreader",
scope: "lte",
trust: 1,
vendor: "goodiware",
version: "3.15.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.10.2",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.12.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.13.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.5.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.3.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.14.2",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.0.3",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.7.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.4.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.12.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.1.2",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.6.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.8.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.0.1",
},
{
model: "goodreader",
scope: "lte",
trust: 1,
vendor: "goodiware",
version: "3.16",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.2.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.10.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.7.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "2.8.5",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.11.0",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.8.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.6.1",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "2.8",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "3.0.2",
},
{
model: "goodreader",
scope: "eq",
trust: 1,
vendor: "goodiware",
version: "2.7.4",
},
{
model: "goodreader",
scope: "lte",
trust: 0.8,
vendor: "goodiware",
version: "for ipad 3.16",
},
{
model: "goodreader",
scope: "lte",
trust: 0.8,
vendor: "goodiware",
version: "for iphone / ipod touch 3.15.1",
},
{
model: "goodreader",
scope: "eq",
trust: 0.3,
vendor: "goodiware",
version: "3.16",
},
{
model: "goodreader",
scope: "ne",
trust: 0.3,
vendor: "goodiware",
version: "3.17.1",
},
{
model: "goodreader",
scope: "ne",
trust: 0.3,
vendor: "goodiware",
version: "3.17",
},
],
sources: [
{
db: "BID",
id: "54872",
},
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
db: "NVD",
id: "CVE-2012-2648",
},
{
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
},
configurations: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
children: {
"@container": "@list",
},
cpe_match: {
"@container": "@list",
},
data: {
"@container": "@list",
},
nodes: {
"@container": "@list",
},
},
data: [
{
CVE_data_version: "4.0",
nodes: [
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.1.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.5:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.14.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.0.3:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:*:-:*:*:*:iphone_os:*:*",
cpe_name: [],
versionEndIncluding: "3.16",
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.10.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.3.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.11.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.6.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.8:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.7.4:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:1.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.13.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.4.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.4:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.10.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.8.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.7.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.0.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.0.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.15.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.10.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.2.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.1.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.6:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.15.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.10.3:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.5.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.3.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.13.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.12.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.5.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.4.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.5.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.3:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.9.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.0.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.14.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.11.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.7.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.6.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.8.4:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.7:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:apple:ipad:*:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.5:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.0.3:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.10.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.3.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.11.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.10.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.4:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.2.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.15.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.10.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.6.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.2.3:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.6:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.13.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.13.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.12.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.4.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.3:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.8.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.7.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.0.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.8.5:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.14.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.0.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:1.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.10.3:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.5.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.11.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.4.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.3.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.9.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.7.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.0.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.8.2:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.7:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.0:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:*:-:*:*:*:iphone_os:*:*",
cpe_name: [],
versionEndIncluding: "3.15.1",
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.6.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:3.5.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:goodiware:goodreader:2.5.1:-:*:*:*:iphone_os:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
{
cpe23Uri: "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
],
},
],
sources: [
{
db: "NVD",
id: "CVE-2012-2648",
},
],
},
credits: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "Keigo Yamazaki of LAC Co. Ltd",
sources: [
{
db: "BID",
id: "54872",
},
],
trust: 0.3,
},
cve: "CVE-2012-2648",
cvss: {
"@context": {
cvssV2: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
},
cvssV3: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
},
severity: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
"@id": "https://www.variotdbs.pl/ref/sources",
},
},
data: [
{
cvssV2: [
{
acInsufInfo: false,
accessComplexity: "MEDIUM",
accessVector: "NETWORK",
authentication: "NONE",
author: "NVD",
availabilityImpact: "NONE",
baseScore: 4.3,
confidentialityImpact: "NONE",
exploitabilityScore: 8.6,
impactScore: 2.9,
integrityImpact: "PARTIAL",
obtainAllPrivilege: false,
obtainOtherPrivilege: false,
obtainUserPrivilege: false,
severity: "MEDIUM",
trust: 1,
userInteractionRequired: true,
vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
version: "2.0",
},
{
acInsufInfo: null,
accessComplexity: "Low",
accessVector: "Network",
authentication: "None",
author: "IPA",
availabilityImpact: "None",
baseScore: 5,
confidentialityImpact: "None",
exploitabilityScore: null,
id: "JVNDB-2012-000073",
impactScore: null,
integrityImpact: "Partial",
obtainAllPrivilege: null,
obtainOtherPrivilege: null,
obtainUserPrivilege: null,
severity: "Medium",
trust: 0.8,
userInteractionRequired: null,
vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
version: "2.0",
},
{
accessComplexity: "MEDIUM",
accessVector: "NETWORK",
authentication: "NONE",
author: "VULHUB",
availabilityImpact: "NONE",
baseScore: 4.3,
confidentialityImpact: "NONE",
exploitabilityScore: 8.6,
id: "VHN-55929",
impactScore: 2.9,
integrityImpact: "PARTIAL",
severity: "MEDIUM",
trust: 0.1,
vectorString: "AV:N/AC:M/AU:N/C:N/I:P/A:N",
version: "2.0",
},
],
cvssV3: [],
severity: [
{
author: "NVD",
id: "CVE-2012-2648",
trust: 1,
value: "MEDIUM",
},
{
author: "IPA",
id: "JVNDB-2012-000073",
trust: 0.8,
value: "Medium",
},
{
author: "CNNVD",
id: "CNNVD-201208-053",
trust: 0.6,
value: "MEDIUM",
},
{
author: "VULHUB",
id: "VHN-55929",
trust: 0.1,
value: "MEDIUM",
},
],
},
],
sources: [
{
db: "VULHUB",
id: "VHN-55929",
},
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
db: "NVD",
id: "CVE-2012-2648",
},
{
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
},
description: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "Cross-site scripting (XSS) vulnerability in the GoodReader app 3.16 and earlier for iOS on the iPad, and 3.15.1 and earlier for iOS on the iPhone and iPod touch, allows remote attackers to inject arbitrary web script or HTML via vectors involving use of this app in conjunction with a web browser. GoodReader contains a cross-site scripting vulnerability. GoodReader is a document reader for Apple mobile devices. GoodReader contains a cross-site scripting vulnerability. Keigo Yamazaki of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.When GoodReader is used through a web browser, an arbitrary script may be executed on the user's web browser. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. \nGoodReader 3.16 and prior versions for iPad are vulnerable. \nGoodReader 3.15.1 and prior versions for iPhone and iPod touch are vulnerable",
sources: [
{
db: "NVD",
id: "CVE-2012-2648",
},
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
db: "BID",
id: "54872",
},
{
db: "VULHUB",
id: "VHN-55929",
},
],
trust: 1.98,
},
external_ids: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
db: "NVD",
id: "CVE-2012-2648",
trust: 2.8,
},
{
db: "JVN",
id: "JVN01598734",
trust: 2.8,
},
{
db: "JVNDB",
id: "JVNDB-2012-000073",
trust: 2.5,
},
{
db: "CNNVD",
id: "CNNVD-201208-053",
trust: 0.7,
},
{
db: "BID",
id: "54872",
trust: 0.4,
},
{
db: "VULHUB",
id: "VHN-55929",
trust: 0.1,
},
],
sources: [
{
db: "VULHUB",
id: "VHN-55929",
},
{
db: "BID",
id: "54872",
},
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
db: "NVD",
id: "CVE-2012-2648",
},
{
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
},
id: "VAR-201208-0739",
iot: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: true,
sources: [
{
db: "VULHUB",
id: "VHN-55929",
},
],
trust: 0.01,
},
last_update_date: "2023-12-18T13:20:09.149000Z",
patch: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
title: "GoodReader",
trust: 0.8,
url: "http://www.goodiware.com/goodreader.html",
},
{
title: "Apple iPad/iPhone/iPod touch iOS Fixes for cross-site scripting vulnerabilities",
trust: 0.6,
url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=203177",
},
],
sources: [
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
},
problemtype_data: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
problemtype: "CWE-79",
trust: 1.9,
},
],
sources: [
{
db: "VULHUB",
id: "VHN-55929",
},
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
db: "NVD",
id: "CVE-2012-2648",
},
],
},
references: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
trust: 2.8,
url: "http://jvn.jp/en/jp/jvn01598734/index.html",
},
{
trust: 1.7,
url: "http://jvndb.jvn.jp/jvndb/jvndb-2012-000073",
},
{
trust: 1.1,
url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2648",
},
{
trust: 0.8,
url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2648",
},
{
trust: 0.3,
url: "http://software.cisco.com/download/navigator.html?mdfid=283613663",
},
{
trust: 0.3,
url: "http://www.goodreader.net/goodreader.html",
},
],
sources: [
{
db: "VULHUB",
id: "VHN-55929",
},
{
db: "BID",
id: "54872",
},
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
db: "NVD",
id: "CVE-2012-2648",
},
{
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
},
sources: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
data: {
"@container": "@list",
},
},
data: [
{
db: "VULHUB",
id: "VHN-55929",
},
{
db: "BID",
id: "54872",
},
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
db: "NVD",
id: "CVE-2012-2648",
},
{
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
},
sources_release_date: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
data: {
"@container": "@list",
},
},
data: [
{
date: "2012-08-07T00:00:00",
db: "VULHUB",
id: "VHN-55929",
},
{
date: "2012-08-07T00:00:00",
db: "BID",
id: "54872",
},
{
date: "2012-08-02T00:00:00",
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
date: "2012-08-07T19:55:02.187000",
db: "NVD",
id: "CVE-2012-2648",
},
{
date: "2012-08-08T00:00:00",
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
},
sources_update_date: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
data: {
"@container": "@list",
},
},
data: [
{
date: "2012-08-10T00:00:00",
db: "VULHUB",
id: "VHN-55929",
},
{
date: "2012-08-07T00:00:00",
db: "BID",
id: "54872",
},
{
date: "2012-08-02T00:00:00",
db: "JVNDB",
id: "JVNDB-2012-000073",
},
{
date: "2022-08-09T13:49:00.607000",
db: "NVD",
id: "CVE-2012-2648",
},
{
date: "2022-08-10T00:00:00",
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
},
threat_type: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "remote",
sources: [
{
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
trust: 0.6,
},
title: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "GoodReader vulnerable to cross-site scripting",
sources: [
{
db: "JVNDB",
id: "JVNDB-2012-000073",
},
],
trust: 0.8,
},
type: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "XSS",
sources: [
{
db: "CNNVD",
id: "CNNVD-201208-053",
},
],
trust: 0.6,
},
}