VAR-200608-0037
Vulnerability from variot - Updated: 2024-07-23 19:45The Download Validation in LaunchServices for Apple Mac OS X 10.4.7 can identify certain HTML as "safe", which could allow attackers to execute Javascript code in local context when the "Open 'safe' files after downloading" option is enabled in Safari. These issue affect Mac OS X and various applications including AFP Server, Bluetooth, Bom, DHCP, Image RAW, ImageIO, Launch Services, OpenSSH, and WebKit. A remote attacker may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and disclose potentially sensitive information
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200608-0037",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": null,
"scope": null,
"trust": 4.8,
"vendor": "apple computer",
"version": null
},
{
"model": "mac os x",
"scope": "eq",
"trust": 2.4,
"vendor": "apple",
"version": "10.4.7"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.4.7"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0.4"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.6"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.6"
},
{
"model": "directory pro",
"scope": "eq",
"trust": 0.3,
"vendor": "cosmicperl",
"version": "10.0.3"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.6"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.7"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.03"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.3"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.7"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.7"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.3"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.6"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.6"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.6"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.7"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.7"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.8"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.7"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#708340"
},
{
"db": "CERT/CC",
"id": "VU#514740"
},
{
"db": "CERT/CC",
"id": "VU#566132"
},
{
"db": "CERT/CC",
"id": "VU#651844"
},
{
"db": "CERT/CC",
"id": "VU#605908"
},
{
"db": "CERT/CC",
"id": "VU#172244"
},
{
"db": "BID",
"id": "19289"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001019"
},
{
"db": "CNNVD",
"id": "CNNVD-200608-046"
},
{
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Dino Dai Zovi ddaizovi@atstake.com Tom Ferris tommy@security-protocols.com Neil ArchibaldRob MiddletonGael DelalleauJesse Ruderman jruderman@gmail.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200608-046"
}
],
"trust": 0.6
},
"cve": "CVE-2006-3504",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2006-3504",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"id": "VHN-19612",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2006-3504",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#776628",
"trust": 0.8,
"value": "0.13"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#514740",
"trust": 0.8,
"value": "0.48"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#566132",
"trust": 0.8,
"value": "1.64"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#651844",
"trust": 0.8,
"value": "7.43"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#605908",
"trust": 0.8,
"value": "8.78"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#172244",
"trust": 0.8,
"value": "7.43"
},
{
"author": "CNNVD",
"id": "CNNVD-200608-046",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-19612",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#776628"
},
{
"db": "CERT/CC",
"id": "VU#514740"
},
{
"db": "CERT/CC",
"id": "VU#566132"
},
{
"db": "CERT/CC",
"id": "VU#651844"
},
{
"db": "CERT/CC",
"id": "VU#605908"
},
{
"db": "CERT/CC",
"id": "VU#172244"
},
{
"db": "VULHUB",
"id": "VHN-19612"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001019"
},
{
"db": "CNNVD",
"id": "CNNVD-200608-046"
},
{
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Download Validation in LaunchServices for Apple Mac OS X 10.4.7 can identify certain HTML as \"safe\", which could allow attackers to execute Javascript code in local context when the \"Open \u0027safe\u0027 files after downloading\" option is enabled in Safari. \nThese issue affect Mac OS X and various applications including AFP Server, Bluetooth, Bom, DHCP, Image RAW, ImageIO, Launch Services, OpenSSH, and WebKit. A remote attacker may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and disclose potentially sensitive information",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3504"
},
{
"db": "CERT/CC",
"id": "VU#708340"
},
{
"db": "CERT/CC",
"id": "VU#776628"
},
{
"db": "CERT/CC",
"id": "VU#514740"
},
{
"db": "CERT/CC",
"id": "VU#566132"
},
{
"db": "CERT/CC",
"id": "VU#651844"
},
{
"db": "CERT/CC",
"id": "VU#605908"
},
{
"db": "CERT/CC",
"id": "VU#172244"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001019"
},
{
"db": "BID",
"id": "19289"
},
{
"db": "VULHUB",
"id": "VHN-19612"
}
],
"trust": 7.02
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "SECUNIA",
"id": "21253",
"trust": 6.5
},
{
"db": "NVD",
"id": "CVE-2006-3504",
"trust": 2.8
},
{
"db": "USCERT",
"id": "TA06-214A",
"trust": 2.5
},
{
"db": "BID",
"id": "19289",
"trust": 2.0
},
{
"db": "OSVDB",
"id": "27743",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2006-3101",
"trust": 1.7
},
{
"db": "CERT/CC",
"id": "VU#708340",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#776628",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#514740",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#566132",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#651844",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#605908",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#172244",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001019",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200608-046",
"trust": 0.7
},
{
"db": "CERT/CC",
"id": "TA06-214A",
"trust": 0.6
},
{
"db": "APPLE",
"id": "APPLE-SA-2006-08-01",
"trust": 0.6
},
{
"db": "XF",
"id": "28146",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-19612",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#708340"
},
{
"db": "CERT/CC",
"id": "VU#776628"
},
{
"db": "CERT/CC",
"id": "VU#514740"
},
{
"db": "CERT/CC",
"id": "VU#566132"
},
{
"db": "CERT/CC",
"id": "VU#651844"
},
{
"db": "CERT/CC",
"id": "VU#605908"
},
{
"db": "CERT/CC",
"id": "VU#172244"
},
{
"db": "VULHUB",
"id": "VHN-19612"
},
{
"db": "BID",
"id": "19289"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001019"
},
{
"db": "CNNVD",
"id": "CNNVD-200608-046"
},
{
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"id": "VAR-200608-0037",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-19612"
}
],
"trust": 0.01
},
"last_update_date": "2024-07-23T19:45:17.247000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APPLE-SA-2006-08-01",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-001019"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 4.8,
"url": "http://docs.info.apple.com/article.html?artnum=304063"
},
{
"trust": 4.8,
"url": "http://secunia.com/advisories/21253/"
},
{
"trust": 2.5,
"url": "http://www.us-cert.gov/cas/techalerts/ta06-214a.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/19289"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/27743"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/21253"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/3101"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28146"
},
{
"trust": 0.8,
"url": "http://manuals.info.apple.com/en/macosxsrvr10.3_systemimageadmin.pdf"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3504"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3504"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/28146"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2006/3101"
},
{
"trust": 0.3,
"url": "http://www.info.apple.com/usen/security/security_updates.html"
},
{
"trust": 0.3,
"url": "http://www.apple.com/macosx/"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/172244"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/514740"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/566132"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/605908"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/651844"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/776628"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/708340"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#708340"
},
{
"db": "CERT/CC",
"id": "VU#776628"
},
{
"db": "CERT/CC",
"id": "VU#514740"
},
{
"db": "CERT/CC",
"id": "VU#566132"
},
{
"db": "CERT/CC",
"id": "VU#651844"
},
{
"db": "CERT/CC",
"id": "VU#605908"
},
{
"db": "CERT/CC",
"id": "VU#172244"
},
{
"db": "VULHUB",
"id": "VHN-19612"
},
{
"db": "BID",
"id": "19289"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001019"
},
{
"db": "CNNVD",
"id": "CNNVD-200608-046"
},
{
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#708340"
},
{
"db": "CERT/CC",
"id": "VU#776628"
},
{
"db": "CERT/CC",
"id": "VU#514740"
},
{
"db": "CERT/CC",
"id": "VU#566132"
},
{
"db": "CERT/CC",
"id": "VU#651844"
},
{
"db": "CERT/CC",
"id": "VU#605908"
},
{
"db": "CERT/CC",
"id": "VU#172244"
},
{
"db": "VULHUB",
"id": "VHN-19612"
},
{
"db": "BID",
"id": "19289"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001019"
},
{
"db": "CNNVD",
"id": "CNNVD-200608-046"
},
{
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-01-29T00:00:00",
"db": "CERT/CC",
"id": "VU#708340"
},
{
"date": "2006-08-02T00:00:00",
"db": "CERT/CC",
"id": "VU#776628"
},
{
"date": "2006-08-02T00:00:00",
"db": "CERT/CC",
"id": "VU#514740"
},
{
"date": "2006-08-02T00:00:00",
"db": "CERT/CC",
"id": "VU#566132"
},
{
"date": "2006-08-02T00:00:00",
"db": "CERT/CC",
"id": "VU#651844"
},
{
"date": "2006-08-02T00:00:00",
"db": "CERT/CC",
"id": "VU#605908"
},
{
"date": "2006-08-02T00:00:00",
"db": "CERT/CC",
"id": "VU#172244"
},
{
"date": "2006-08-03T00:00:00",
"db": "VULHUB",
"id": "VHN-19612"
},
{
"date": "2006-08-01T00:00:00",
"db": "BID",
"id": "19289"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-001019"
},
{
"date": "2005-04-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200608-046"
},
{
"date": "2006-08-03T01:04:00",
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-01-29T00:00:00",
"db": "CERT/CC",
"id": "VU#708340"
},
{
"date": "2006-08-03T00:00:00",
"db": "CERT/CC",
"id": "VU#776628"
},
{
"date": "2006-08-02T00:00:00",
"db": "CERT/CC",
"id": "VU#514740"
},
{
"date": "2006-08-02T00:00:00",
"db": "CERT/CC",
"id": "VU#566132"
},
{
"date": "2006-08-14T00:00:00",
"db": "CERT/CC",
"id": "VU#651844"
},
{
"date": "2006-08-14T00:00:00",
"db": "CERT/CC",
"id": "VU#605908"
},
{
"date": "2006-08-14T00:00:00",
"db": "CERT/CC",
"id": "VU#172244"
},
{
"date": "2017-07-20T00:00:00",
"db": "VULHUB",
"id": "VHN-19612"
},
{
"date": "2007-11-15T00:35:00",
"db": "BID",
"id": "19289"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-001019"
},
{
"date": "2006-08-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200608-046"
},
{
"date": "2017-07-20T01:32:21.477000",
"db": "NVD",
"id": "CVE-2006-3504"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200608-046"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple Mac OS X AFP server may disclose file and folder information in search results",
"sources": [
{
"db": "CERT/CC",
"id": "VU#708340"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200608-046"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…