All the vulnerabilites related to omnigroup - omniweb
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omnigroup:omniweb:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "723170E8-2945-4D6E-AF82-485EF9EC00A9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in OmniGroup OmniWeb 5.5.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via format string specifiers in the Javascript alert function." }, { "lang": "es", "value": "Vulnerabilidad de formato de cadena en OmniGroup OmniWeb 5.5.1 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de formatos espec\u00edficos de cadena en la funci\u00f3n de alerta de Javascript." } ], "id": "CVE-2007-0148", "lastModified": "2024-11-21T00:25:06.323", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-01-09T18:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/31222" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://projects.info-pull.com/moab/MOAB-07-01-2007.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23624" }, { "source": "cve@mitre.org", "url": "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.omnigroup.com/applications/omniweb/releasenotes/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/456578/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/21911" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0075" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31324" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/3098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/31222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://projects.info-pull.com/moab/MOAB-07-01-2007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.omnigroup.com/applications/omniweb/releasenotes/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/456578/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/21911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/3098" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "443FF271-A3AB-4659-80B2-89F771BF5371", "vulnerable": true }, { "criteria": "cpe:2.3:a:hmdt:shiira:0.93:*:*:*:*:*:*:*", "matchCriteriaId": "8DF8DEAB-3C52-4197-BC87-213EF7D45E15", "vulnerable": true }, { "criteria": "cpe:2.3:a:omnigroup:omniweb:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBAD3B-6388-4356-BEEE-32D8F69D5446", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AppleWebKit (WebCore and WebKit), as used in multiple products such as Safari 1.2 and OmniGroup OmniWeb 5.1, allows remote attackers to read arbitrary files via the XMLHttpRequest Javascript component, as demonstrated using automatically mounted disk images and file:// URLs." } ], "id": "CVE-2005-0976", "lastModified": "2024-11-20T23:56:18.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://remahl.se/david/vuln/001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://remahl.se/david/vuln/001/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*", "matchCriteriaId": "078698FD-775C-4B73-998D-F6B4F601185C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "D044E602-45A5-4B14-8B16-B0978D985027", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*", "matchCriteriaId": "31063052-D74D-41D0-B63D-4A7BADAC9C60", "versionEndIncluding": "1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*", "matchCriteriaId": "ECD3E937-C813-4564-9E3C-D009D39E8A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFE75E76-E20D-47A4-9603-0AF46F733AEF", "versionEndIncluding": "7.54", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ], "id": "CVE-2005-0238", "lastModified": "2024-11-20T23:54:42.133", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12461" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.shmoo.com/idn" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.shmoo.com/idn" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*", "matchCriteriaId": "ECD3E937-C813-4564-9E3C-D009D39E8A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The International Domain Name (IDN) support in Omniweb 5 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ], "id": "CVE-2005-0236", "lastModified": "2024-11-20T23:54:41.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/12461" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.shmoo.com/idn" }, { "source": "secalert@redhat.com", "url": "http://www.shmoo.com/idn/homograph.txt" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.shmoo.com/idn" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.shmoo.com/idn/homograph.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mozilla | camino | 0.8.5 | |
mozilla | firefox | 1.0 | |
mozilla | mozilla | * | |
omnigroup | omniweb | 5 | |
opera | opera_browser | * | |
opera_software | opera_web_browser | 7.54 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "D044E602-45A5-4B14-8B16-B0978D985027", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6F232DA-F897-4429-922E-F5CFF865A8AA", "versionEndExcluding": "1.7.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*", "matchCriteriaId": "ECD3E937-C813-4564-9E3C-D009D39E8A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFE75E76-E20D-47A4-9603-0AF46F733AEF", "versionEndIncluding": "7.54", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "142EB1E3-2918-4792-83D7-9D7B6A3BD26B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ], "id": "CVE-2005-0233", "lastModified": "2024-11-20T23:54:41.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-02-08T05:00:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/mfsa2005-29.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-176.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-384.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12461" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.shmoo.com/idn" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "source": "secalert@redhat.com", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029" }, { "source": "secalert@redhat.com", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://www.mozilla.org/security/announce/mfsa2005-29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-176.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-384.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/12461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.shmoo.com/idn" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Vendor Advisory" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omnigroup:omniweb:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5FA335F-AFD8-48A3-9CE5-E6DD51A79D17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in OmniWeb allows remote attackers to bypass intended port restrictions on outbound TCP connections via a port number outside the range of the unsigned short data type, as demonstrated by a value of 65561 for TCP port 25." }, { "lang": "es", "value": "Desbordamiento de entero en OmniWeb permite a atacantes remotos evitar las restricciones establecidas en los puertos de las conexiones salientes TCP a trav\u00e9s de un n\u00famero de puerto fuera del rango del tipo de dato de valor corto sin signo, como se ha demostrado con el valor 65561 para el puerto TCP 25." } ], "id": "CVE-2010-1102", "lastModified": "2024-11-21T01:13:38.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-03-24T22:45:16.107", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/510283/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/510283/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57236" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://security-protocols.com/sp-x41-advisory.php | Exploit, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/22059 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://security-protocols.com/sp-x41-advisory.php | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/22059 | Exploit |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:safari:2.0.4_419.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6D113B5-070D-4F91-AB5E-222D71C90EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:webkit:build_18794:*:*:*:*:*:*:*", "matchCriteriaId": "0026565B-0264-495B-851F-5E71439DA8EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:omnigroup:omniweb:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "BC068FD4-9B1B-42E3-9544-1E020602F96F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WebCore in Apple WebKit build 18794 allows remote attackers to cause a denial of service (null dereference and application crash) via a TD element with a large number in the ROWSPAN attribute, as demonstrated by a crash of OmniWeb 5.5.3 on Mac OS X 10.4.8, a different vulnerability than CVE-2006-2019." }, { "lang": "es", "value": "WebCore en Apple WebKit construcci\u00f3n 18974 permite a un atacante remoto provocar denegaci\u00f3n de servicio de un servicio (referencia null y caida de aplicaci\u00f3n) a trav\u00e9s del elemento TD con un gran n\u00famero en el atributo ROWSPAN, como se demostr\u00f3 con un caida de OmniWeb 5.5.3 sobre Mac OS X 10.4.8, una vulnerabilidad diferente que la CVE-2006-2019." } ], "id": "CVE-2007-0342", "lastModified": "2024-11-21T00:25:37.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-01-18T02:28:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://security-protocols.com/sp-x41-advisory.php" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://security-protocols.com/sp-x41-advisory.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22059" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2005-0238
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.shmoo.com/idn/homograph.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 | vdb-entry, x_refsource_XF | |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html | mailing-list, x_refsource_FULLDISC | |
http://www.shmoo.com/idn | x_refsource_MISC | |
https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/12461 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:05:25.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.shmoo.com/idn" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399" }, { "name": "12461", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12461" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.shmoo.com/idn" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399" }, { "name": "12461", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12461" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2005-0238", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.shmoo.com/idn/homograph.txt", "refsource": "MISC", "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "name": "http://www.shmoo.com/idn", "refsource": "MISC", "url": "http://www.shmoo.com/idn" }, { "name": "https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399" }, { "name": "12461", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12461" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-0238", "datePublished": "2005-02-07T05:00:00", "dateReserved": "2005-02-07T00:00:00", "dateUpdated": "2024-08-07T21:05:25.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1102
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/57236 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/510283/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:05.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "omniweb-tcp-security-bypass(57236)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57236" }, { "name": "20100323 Safari browser port blocking bypassed by integer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/510283/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-03-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in OmniWeb allows remote attackers to bypass intended port restrictions on outbound TCP connections via a port number outside the range of the unsigned short data type, as demonstrated by a value of 65561 for TCP port 25." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "omniweb-tcp-security-bypass(57236)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57236" }, { "name": "20100323 Safari browser port blocking bypassed by integer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/510283/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in OmniWeb allows remote attackers to bypass intended port restrictions on outbound TCP connections via a port number outside the range of the unsigned short data type, as demonstrated by a value of 65561 for TCP port 25." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "omniweb-tcp-security-bypass(57236)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57236" }, { "name": "20100323 Safari browser port blocking bypassed by integer overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/510283/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1102", "datePublished": "2010-03-24T18:00:00", "dateReserved": "2010-03-24T00:00:00", "dateUpdated": "2024-08-07T01:14:05.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0976
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html | vendor-advisory, x_refsource_APPLE | |
http://remahl.se/david/vuln/001/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:35:58.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2005-04-15", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://remahl.se/david/vuln/001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "AppleWebKit (WebCore and WebKit), as used in multiple products such as Safari 1.2 and OmniGroup OmniWeb 5.1, allows remote attackers to read arbitrary files via the XMLHttpRequest Javascript component, as demonstrated using automatically mounted disk images and file:// URLs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-05-17T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "APPLE-SA-2005-04-15", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://remahl.se/david/vuln/001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0976", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AppleWebKit (WebCore and WebKit), as used in multiple products such as Safari 1.2 and OmniGroup OmniWeb 5.1, allows remote attackers to read arbitrary files via the XMLHttpRequest Javascript component, as demonstrated using automatically mounted disk images and file:// URLs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2005-04-15", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html" }, { "name": "http://remahl.se/david/vuln/001/", "refsource": "MISC", "url": "http://remahl.se/david/vuln/001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0976", "datePublished": "2005-04-18T04:00:00", "dateReserved": "2005-04-05T00:00:00", "dateUpdated": "2024-08-07T21:35:58.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0236
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.shmoo.com/idn/homograph.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 | vdb-entry, x_refsource_XF | |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html | mailing-list, x_refsource_FULLDISC | |
http://www.shmoo.com/idn | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=110782704923280&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/12461 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:05:25.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.shmoo.com/idn" }, { "name": "20050208 International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "name": "12461", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12461" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The International Domain Name (IDN) support in Omniweb 5 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.shmoo.com/idn" }, { "name": "20050208 International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "name": "12461", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12461" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2005-0236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The International Domain Name (IDN) support in Omniweb 5 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.shmoo.com/idn/homograph.txt", "refsource": "MISC", "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "name": "http://www.shmoo.com/idn", "refsource": "MISC", "url": "http://www.shmoo.com/idn" }, { "name": "20050208 International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "name": "12461", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12461" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-0236", "datePublished": "2005-02-07T05:00:00", "dateReserved": "2005-02-07T00:00:00", "dateUpdated": "2024-08-07T21:05:25.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0148
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.omnigroup.com/applications/omniweb/releasenotes/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/21911 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/3098 | exploit, x_refsource_EXPLOIT-DB | |
http://secunia.com/advisories/23624 | third-party-advisory, x_refsource_SECUNIA | |
http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/ | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/0075 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31324 | vdb-entry, x_refsource_XF | |
http://projects.info-pull.com/moab/MOAB-07-01-2007.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/456578/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://osvdb.org/31222 | vdb-entry, x_refsource_OSVDB | |
http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:03:37.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.omnigroup.com/applications/omniweb/releasenotes/" }, { "name": "21911", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21911" }, { "name": "3098", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/3098" }, { "name": "23624", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23624" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/" }, { "name": "ADV-2007-0075", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0075" }, { "name": "omniweb-alert-format-string(31324)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31324" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://projects.info-pull.com/moab/MOAB-07-01-2007.html" }, { "name": "20070111 DMA[2007-0107a] OmniWeb Javascript Alert Format String Vulnerabiity and DMA[2007-0109a] Apple Finder Disk Image Volume Label Overflow / DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/456578/100/0/threaded" }, { "name": "31222", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/31222" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in OmniGroup OmniWeb 5.5.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via format string specifiers in the Javascript alert function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.omnigroup.com/applications/omniweb/releasenotes/" }, { "name": "21911", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21911" }, { "name": "3098", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/3098" }, { "name": "23624", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23624" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/" }, { "name": "ADV-2007-0075", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0075" }, { "name": "omniweb-alert-format-string(31324)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31324" }, { "tags": [ "x_refsource_MISC" ], "url": "http://projects.info-pull.com/moab/MOAB-07-01-2007.html" }, { "name": "20070111 DMA[2007-0107a] OmniWeb Javascript Alert Format String Vulnerabiity and DMA[2007-0109a] Apple Finder Disk Image Volume Label Overflow / DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/456578/100/0/threaded" }, { "name": "31222", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/31222" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in OmniGroup OmniWeb 5.5.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via format string specifiers in the Javascript alert function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.omnigroup.com/applications/omniweb/releasenotes/", "refsource": "CONFIRM", "url": "http://www.omnigroup.com/applications/omniweb/releasenotes/" }, { "name": "21911", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21911" }, { "name": "3098", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/3098" }, { "name": "23624", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23624" }, { "name": "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/", "refsource": "CONFIRM", "url": "http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/" }, { "name": "ADV-2007-0075", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0075" }, { "name": "omniweb-alert-format-string(31324)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31324" }, { "name": "http://projects.info-pull.com/moab/MOAB-07-01-2007.html", "refsource": "MISC", "url": "http://projects.info-pull.com/moab/MOAB-07-01-2007.html" }, { "name": "20070111 DMA[2007-0107a] OmniWeb Javascript Alert Format String Vulnerabiity and DMA[2007-0109a] Apple Finder Disk Image Volume Label Overflow / DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/456578/100/0/threaded" }, { "name": "31222", "refsource": "OSVDB", "url": "http://osvdb.org/31222" }, { "name": "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt", "refsource": "MISC", "url": "http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0148", "datePublished": "2007-01-09T18:00:00", "dateReserved": "2007-01-09T00:00:00", "dateUpdated": "2024-08-07T12:03:37.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0233
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:05:25.422Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.shmoo.com/idn" }, { "name": "SUSE-SA:2005:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html" }, { "name": "oval:org.mitre.oval:def:11229", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229" }, { "name": "oval:org.mitre.oval:def:100029", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029" }, { "name": "RHSA-2005:176", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-176.html" }, { "name": "RHSA-2005:384", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-384.html" }, { "name": "GLSA-200503-30", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml" }, { "name": "GLSA-200503-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml" }, { "name": "20050208 International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "name": "12461", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12461" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/mfsa2005-29.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.shmoo.com/idn" }, { "name": "SUSE-SA:2005:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html" }, { "name": "oval:org.mitre.oval:def:11229", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229" }, { "name": "oval:org.mitre.oval:def:100029", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029" }, { "name": "RHSA-2005:176", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-176.html" }, { "name": "RHSA-2005:384", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-384.html" }, { "name": "GLSA-200503-30", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml" }, { "name": "GLSA-200503-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml" }, { "name": "20050208 International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110782704923280\u0026w=2" }, { "name": "12461", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12461" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/mfsa2005-29.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-0233", "datePublished": "2005-02-07T05:00:00", "dateReserved": "2005-02-07T00:00:00", "dateUpdated": "2024-08-07T21:05:25.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0342
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/22059 | vdb-entry, x_refsource_BID | |
http://security-protocols.com/sp-x41-advisory.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:12:18.018Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "22059", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22059" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://security-protocols.com/sp-x41-advisory.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WebCore in Apple WebKit build 18794 allows remote attackers to cause a denial of service (null dereference and application crash) via a TD element with a large number in the ROWSPAN attribute, as demonstrated by a crash of OmniWeb 5.5.3 on Mac OS X 10.4.8, a different vulnerability than CVE-2006-2019." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-01-18T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "22059", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22059" }, { "tags": [ "x_refsource_MISC" ], "url": "http://security-protocols.com/sp-x41-advisory.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WebCore in Apple WebKit build 18794 allows remote attackers to cause a denial of service (null dereference and application crash) via a TD element with a large number in the ROWSPAN attribute, as demonstrated by a crash of OmniWeb 5.5.3 on Mac OS X 10.4.8, a different vulnerability than CVE-2006-2019." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "22059", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22059" }, { "name": "http://security-protocols.com/sp-x41-advisory.php", "refsource": "MISC", "url": "http://security-protocols.com/sp-x41-advisory.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0342", "datePublished": "2007-01-18T02:00:00Z", "dateReserved": "2007-01-17T00:00:00Z", "dateUpdated": "2024-09-16T18:13:20.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-200701-0050
Vulnerability from variot
WebCore in Apple WebKit build 18794 allows remote attackers to cause a denial of service (null dereference and application crash) via a TD element with a large number in the ROWSPAN attribute, as demonstrated by a crash of OmniWeb 5.5.3 on Mac OS X 10.4.8, a different vulnerability than CVE-2006-2019. Apple WebKit is prone to a denial-of-service vulnerability. Attackers may exploit this issue by enticing victims into opening a malicious HTML document with an application using the affected framework. Successful exploits will result in denial-of-service conditions. Applications using WebKit build 18794 are vulnerable to this issue
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200701-0050", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 2.4, "vendor": "apple", "version": "10.4.8" }, { "model": "omniweb", "scope": "eq", "trust": 1.8, "vendor": "omnigroup", "version": "5.5.3" }, { "model": "webkit", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "build_18794" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.4_419.3" }, { "model": "webkit", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "build 18794" }, { "model": "group omniweb", "scope": "eq", "trust": 0.3, "vendor": "omni", "version": "5.5.3" }, { "model": "webkit build", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "18794" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" } ], "sources": [ { "db": "BID", "id": "22059" }, { "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "db": "NVD", "id": "CVE-2007-0342" }, { "db": "CNNVD", "id": "CNNVD-200701-284" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:safari:2.0.4_419.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:webkit:build_18794:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omnigroup:omniweb:5.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-0342" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tom Ferris is credited with the discovery of this issue.", "sources": [ { "db": "BID", "id": "22059" }, { "db": "CNNVD", "id": "CNNVD-200701-284" } ], "trust": 0.9 }, "cve": "CVE-2007-0342", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2007-0342", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-23704", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-0342", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200701-284", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-23704", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-23704" }, { "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "db": "NVD", "id": "CVE-2007-0342" }, { "db": "CNNVD", "id": "CNNVD-200701-284" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebCore in Apple WebKit build 18794 allows remote attackers to cause a denial of service (null dereference and application crash) via a TD element with a large number in the ROWSPAN attribute, as demonstrated by a crash of OmniWeb 5.5.3 on Mac OS X 10.4.8, a different vulnerability than CVE-2006-2019. Apple WebKit is prone to a denial-of-service vulnerability. \nAttackers may exploit this issue by enticing victims into opening a malicious HTML document with an application using the affected framework. \nSuccessful exploits will result in denial-of-service conditions. \nApplications using WebKit build 18794 are vulnerable to this issue", "sources": [ { "db": "NVD", "id": "CVE-2007-0342" }, { "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "db": "BID", "id": "22059" }, { "db": "VULHUB", "id": "VHN-23704" } ], "trust": 1.98 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-23704", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-23704" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-0342", "trust": 2.5 }, { "db": "BID", "id": "22059", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2007-001403", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200701-284", "trust": 0.7 }, { "db": "SEEBUG", "id": "SSVID-82965", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "29461", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-23704", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-23704" }, { "db": "BID", "id": "22059" }, { "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "db": "NVD", "id": "CVE-2007-0342" }, { "db": "CNNVD", "id": "CNNVD-200701-284" } ] }, "id": "VAR-200701-0050", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-23704" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:25:48.623000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.apple.com/" }, { "title": "OmniWeb", "trust": 0.8, "url": "http://www.omnigroup.com/products/omniweb/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001403" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-23704" }, { "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "db": "NVD", "id": "CVE-2007-0342" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/22059" }, { "trust": 1.7, "url": "http://security-protocols.com/sp-x41-advisory.php" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0342" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0342" }, { "trust": 0.3, "url": "http://www.apple.com/safari/" }, { "trust": 0.3, "url": "http://webkit.org" }, { "trust": 0.3, "url": "http://www.apple.com" }, { "trust": 0.3, "url": "http://developer.apple.com/darwin/projects/webcore/" }, { "trust": 0.3, "url": "http://www.omnigroup.com/applications/omniweb/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-23704" }, { "db": "BID", "id": "22059" }, { "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "db": "NVD", "id": "CVE-2007-0342" }, { "db": "CNNVD", "id": "CNNVD-200701-284" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-23704" }, { "db": "BID", "id": "22059" }, { "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "db": "NVD", "id": "CVE-2007-0342" }, { "db": "CNNVD", "id": "CNNVD-200701-284" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-01-18T00:00:00", "db": "VULHUB", "id": "VHN-23704" }, { "date": "2007-01-15T00:00:00", "db": "BID", "id": "22059" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "date": "2007-01-18T02:28:00", "db": "NVD", "id": "CVE-2007-0342" }, { "date": "2007-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-200701-284" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-09-05T00:00:00", "db": "VULHUB", "id": "VHN-23704" }, { "date": "2007-01-16T18:00:00", "db": "BID", "id": "22059" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001403" }, { "date": "2008-09-05T04:00:00", "db": "NVD", "id": "CVE-2007-0342" }, { "date": "2007-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200701-284" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200701-284" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple WebKit of WebCore Denial of service in Japan (DoS) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001403" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200701-284" } ], "trust": 0.6 } }
var-200505-1089
Vulnerability from variot
AppleWebKit (WebCore and WebKit), as used in multiple products such as Safari 1.2 and OmniGroup OmniWeb 5.1, allows remote attackers to read arbitrary files via the XMLHttpRequest Javascript component, as demonstrated using automatically mounted disk images and file:// URLs. Web browsers based on AppleWebKit may allow remote web sites to reference content on the local filesystem. This may allow an attacker to execute script within the security context of the local machine. A remote code execution vulnerability affects Apple's WebCore Framework. This issue is due to a failure of the affected framework library to securely handle remote scripts. An attacker may leverage this issue to execute arbitrary code with the privileges of a user that activated the malicious remote script, facilitating unauthorized access and privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200505-1089", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "omniweb", "scope": "eq", "trust": 1.6, "vendor": "omnigroup", "version": "5.1" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.2" }, { "model": "shiira", "scope": "eq", "trust": 1.0, "vendor": "hmdt", "version": "0.93" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "omnigroup", "version": null }, { "model": "group omniweb", "scope": "eq", "trust": 0.3, "vendor": "omni", "version": "5.1" }, { "model": "safari rss pre-release", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0" }, { "model": "safari", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "1.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "BID", "id": "13202" }, { "db": "NVD", "id": "CVE-2005-0976" }, { "db": "CNNVD", "id": "CNNVD-200505-620" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omnigroup:omniweb:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hmdt:shiira:0.93:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0976" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Remahl", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-620" } ], "trust": 0.6 }, "cve": "CVE-2005-0976", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-12185", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-0976", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#998369", "trust": 0.8, "value": "4.78" }, { "author": "CNNVD", "id": "CNNVD-200505-620", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-12185", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "VULHUB", "id": "VHN-12185" }, { "db": "NVD", "id": "CVE-2005-0976" }, { "db": "CNNVD", "id": "CNNVD-200505-620" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AppleWebKit (WebCore and WebKit), as used in multiple products such as Safari 1.2 and OmniGroup OmniWeb 5.1, allows remote attackers to read arbitrary files via the XMLHttpRequest Javascript component, as demonstrated using automatically mounted disk images and file:// URLs. Web browsers based on AppleWebKit may allow remote web sites to reference content on the local filesystem. This may allow an attacker to execute script within the security context of the local machine. A remote code execution vulnerability affects Apple\u0027s WebCore Framework. This issue is due to a failure of the affected framework library to securely handle remote scripts. \nAn attacker may leverage this issue to execute arbitrary code with the privileges of a user that activated the malicious remote script, facilitating unauthorized access and privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2005-0976" }, { "db": "CERT/CC", "id": "VU#998369" }, { "db": "BID", "id": "13202" }, { "db": "VULHUB", "id": "VHN-12185" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-0976", "trust": 2.0 }, { "db": "BID", "id": "13202", "trust": 1.2 }, { "db": "XF", "id": "20124", "trust": 0.8 }, { "db": "OSVDB", "id": "15637", "trust": 0.8 }, { "db": "SECUNIA", "id": "14974", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#998369", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200505-620", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2005-04-15", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-12185", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "VULHUB", "id": "VHN-12185" }, { "db": "BID", "id": "13202" }, { "db": "NVD", "id": "CVE-2005-0976" }, { "db": "CNNVD", "id": "CNNVD-200505-620" } ] }, "id": "VAR-200505-1089", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-12185" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:13:36.953000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0976" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://remahl.se/david/vuln/001/" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2005/apr/msg00000.html" }, { "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=301327" }, { "trust": 0.8, "url": "http://www.osvdb.org/15637" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/20124" }, { "trust": 0.8, "url": "http://secunia.com/advisories/14974" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/13202" }, { "trust": 0.8, "url": "http://packetstormsecurity.org/0504-advisories/apple_webkit_filedisclosure.txt" }, { "trust": 0.8, "url": "http://www.omnigroup.com/applications/omniweb/releasenotes/" }, { "trust": 0.3, "url": "http://developer.apple.com/darwin/projects/webcore/" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.3, "url": "http://www.omnigroup.com/applications/omniweb/" }, { "trust": 0.3, "url": "http://www.apple.com/safari/" }, { "trust": 0.3, "url": "http://hmdt-web.net/shiira/index-e.html" }, { "trust": 0.3, "url": "/archive/1/396046" }, { "trust": 0.1, "url": "" } ], "sources": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "VULHUB", "id": "VHN-12185" }, { "db": "BID", "id": "13202" }, { "db": "NVD", "id": "CVE-2005-0976" }, { "db": "CNNVD", "id": "CNNVD-200505-620" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "VULHUB", "id": "VHN-12185" }, { "db": "BID", "id": "13202" }, { "db": "NVD", "id": "CVE-2005-0976" }, { "db": "CNNVD", "id": "CNNVD-200505-620" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-07-06T00:00:00", "db": "CERT/CC", "id": "VU#998369" }, { "date": "2005-05-02T00:00:00", "db": "VULHUB", "id": "VHN-12185" }, { "date": "2005-04-16T00:00:00", "db": "BID", "id": "13202" }, { "date": "2005-05-02T04:00:00", "db": "NVD", "id": "CVE-2005-0976" }, { "date": "2005-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-620" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-07-06T00:00:00", "db": "CERT/CC", "id": "VU#998369" }, { "date": "2008-09-05T00:00:00", "db": "VULHUB", "id": "VHN-12185" }, { "date": "2009-07-12T12:56:00", "db": "BID", "id": "13202" }, { "date": "2008-09-05T20:47:51.113000", "db": "NVD", "id": "CVE-2005-0976" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-620" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-620" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple WebCore Framework XMLHttpRequests Remote Code Execution Vulnerability", "sources": [ { "db": "BID", "id": "13202" }, { "db": "CNNVD", "id": "CNNVD-200505-620" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-620" } ], "trust": 0.6 } }