mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
138 lines
4.3 KiB
JSON
138 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2009-1701",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Use-after-free vulnerability in the JavaScript DOM implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by destroying a document.body element that has an unspecified XML container with elements that support the dir attribute."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20090608 ZDI-09-033: Apple WebKit dir Attribute Freeing Dangling Object Pointer Vulnerability",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/504172/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-09-033/",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-09-033/"
|
|
},
|
|
{
|
|
"name" : "http://support.apple.com/kb/HT3613",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.apple.com/kb/HT3613"
|
|
},
|
|
{
|
|
"name" : "http://support.apple.com/kb/HT3639",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.apple.com/kb/HT3639"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2009-06-08-1",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2009-06-17-1",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SR:2011:002",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
|
},
|
|
{
|
|
"name" : "35260",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/35260"
|
|
},
|
|
{
|
|
"name" : "35325",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/35325"
|
|
},
|
|
{
|
|
"name" : "55008",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://osvdb.org/55008"
|
|
},
|
|
{
|
|
"name" : "1022345",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1022345"
|
|
},
|
|
{
|
|
"name" : "35379",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/35379"
|
|
},
|
|
{
|
|
"name" : "43068",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/43068"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-1522",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/1522"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-1621",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/1621"
|
|
},
|
|
{
|
|
"name" : "ADV-2011-0212",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2011/0212"
|
|
}
|
|
]
|
|
}
|
|
}
|