mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.8 KiB
JSON
87 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"ID": "CVE-2015-3729",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not indicate what web site originated an input prompt, which allows remote attackers to conduct spoofing attacks via a crafted site."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "1033274",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1033274"
|
|
},
|
|
{
|
|
"name": "https://support.apple.com/kb/HT205030",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.apple.com/kb/HT205030"
|
|
},
|
|
{
|
|
"name": "APPLE-SA-2015-08-13-3",
|
|
"refsource": "APPLE",
|
|
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html"
|
|
},
|
|
{
|
|
"name": "76342",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/76342"
|
|
},
|
|
{
|
|
"name": "APPLE-SA-2015-08-13-1",
|
|
"refsource": "APPLE",
|
|
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html"
|
|
},
|
|
{
|
|
"name": "https://support.apple.com/kb/HT205033",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.apple.com/kb/HT205033"
|
|
}
|
|
]
|
|
}
|
|
} |