2017-10-16 12:31:07 -04:00
{
2019-03-18 05:37:40 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2010-1119" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 05:37:40 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Safari before 4.1 on Mac OS X 10.4, and Safari on Apple iPhone OS allows remote attackers to execute arbitrary code or cause a denial of service (application crash), or read the SMS database or other data, via vectors related to \"attribute manipulation,\" as demonstrated by Vincenzo Iozzo and Ralf Philipp Weinmann during a Pwn2Own competition at CanSecWest 2010."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "http://support.apple.com/kb/HT4220" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.apple.com/kb/HT4220"
} ,
{
"name" : "http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010" ,
"refsource" : "MISC" ,
"url" : "http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010"
} ,
{
"name" : "http://support.apple.com/kb/HT4225" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.apple.com/kb/HT4225"
} ,
{
"name" : "APPLE-SA-2010-06-07-1" ,
"refsource" : "APPLE" ,
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
} ,
{
"name" : "40196" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/40196"
} ,
{
"name" : "40105" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/40105"
} ,
{
"name" : "ADV-2010-1373" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2010/1373"
} ,
{
"name" : "APPLE-SA-2010-06-16-1" ,
"refsource" : "APPLE" ,
"url" : "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html"
} ,
{
"name" : "http://news.cnet.com/8301-27080_3-20001126-245.html" ,
"refsource" : "MISC" ,
"url" : "http://news.cnet.com/8301-27080_3-20001126-245.html"
} ,
{
"name" : "ADV-2010-1512" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2010/1512"
} ,
{
"name" : "40620" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/40620"
} ,
{
"name" : "oval:org.mitre.oval:def:7037" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7037"
} ,
{
"name" : "8128" ,
"refsource" : "SREASON" ,
"url" : "http://securityreason.com/securityalert/8128"
} ,
{
"name" : "1024067" ,
"refsource" : "SECTRACK" ,
"url" : "http://securitytracker.com/id?1024067"
} ,
{
"name" : "http://support.apple.com/kb/HT4196" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.apple.com/kb/HT4196"
} ,
{
"name" : "APPLE-SA-2010-06-21-1" ,
"refsource" : "APPLE" ,
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
} ,
{
"name" : "http://twitter.com/thezdi/statuses/11001080021" ,
"refsource" : "MISC" ,
"url" : "http://twitter.com/thezdi/statuses/11001080021"
}
]
}
}