{"securityvulns": [{"lastseen": "2018-08-31T11:10:49", "bulletinFamily": "software", "cvelist": ["CVE-2013-1045", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1038", "CVE-2013-2842", "CVE-2013-1001", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-1000", "CVE-2013-5140", "CVE-2013-1003", "CVE-2013-3954", "CVE-2013-0992", "CVE-2013-1043", "CVE-2013-5134", "CVE-2013-1044", "CVE-2013-0998", "CVE-2013-5126", "CVE-2013-5125", "CVE-2013-1026", "CVE-2013-1004", "CVE-2013-5142", "CVE-2012-2825", "CVE-2013-1019", "CVE-2013-3953", "CVE-2013-1025", "CVE-2013-0879", "CVE-2012-5134", "CVE-2013-0993", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-5145", "CVE-2013-5139", "CVE-2013-0994", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1011", "CVE-2013-5138", "CVE-2013-1037", "CVE-2013-0997", "CVE-2012-2870", "CVE-2013-1010", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-0996", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1006", "CVE-2013-1008", "CVE-2011-2391", "CVE-2013-1047", "CVE-2013-0999", "CVE-2012-2807", "CVE-2013-3950"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nAPPLE-SA-2013-09-20-1 Apple TV 6.0\r\n\r\nApple TV 6.0 is now available and addresses the following:\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Viewing a maliciously crafted PDF file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow existed in the handling of JBIG2\r\nencoded data in PDF files. This issue was addressed through\r\nadditional bounds checking.\r\nCVE-ID\r\nCVE-2013-1025 : Felix Groebert of the Google Security Team\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Playing a maliciously crafted movie file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow existed in the handling of Sorenson\r\nencoded movie files. This issue was addressed through improved bounds\r\nchecking.\r\nCVE-ID\r\nCVE-2013-1019 : Tom Gallagher (Microsoft) & Paul Bates (Microsoft)\r\nworking with HP's Zero Day Initiative\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: An attacker with a privileged network position may intercept\r\nuser credentials or other sensitive information\r\nDescription: TrustWave, a trusted root CA, has issued, and\r\nsubsequently revoked, a sub-CA certificate from one of its trusted\r\nanchors. This sub-CA facilitated the interception of communications\r\nsecured by Transport Layer Security (TLS). This update added the\r\ninvolved sub-CA certificate to OS X's list of untrusted certificates.\r\nCVE-ID\r\nCVE-2013-5134\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: An attacker who has arbitrary code execution on a device may\r\nbe able to persist code execution across reboots\r\nDescription: Multiple buffer overflows existed in dyld's\r\nopenSharedCacheFile() function. These issues were addressed through\r\nimproved bounds checking.\r\nCVE-ID\r\nCVE-2013-3950 : Stefan Esser\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Viewing a maliciously crafted PDF file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow existed in the handling of JPEG2000\r\nencoded data in PDF files. This issue was addressed through\r\nadditional bounds checking.\r\nCVE-ID\r\nCVE-2013-1026 : Felix Groebert of the Google Security Team\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: A malicious local application could cause an unexpected\r\nsystem termination\r\nDescription: A null pointer dereference existed in IOCatalogue.\r\nThe issue was addressed through additional type checking.\r\nCVE-ID\r\nCVE-2013-5138 : Will Estes\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Executing a malicious application may result in arbitrary\r\ncode execution within the kernel\r\nDescription: An out of bounds array access existed in the\r\nIOSerialFamily driver. This issue was addressed through additional\r\nbounds checking.\r\nCVE-ID\r\nCVE-2013-5139 : @dent1zt\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: A remote attacker can cause a device to unexpectedly restart\r\nDescription: Sending an invalid packet fragment to a device can\r\ncause a kernel assert to trigger, leading to a device restart. The\r\nissue was addressed through additional validation of packet\r\nfragments.\r\nCVE-ID\r\nCVE-2013-5140 : Joonas Kuorilehto of Codenomicon, an anonymous\r\nresearcher working with CERT-FI, Antti LevomAki and Lauri Virtanen\r\nof Vulnerability Analysis Group, Stonesoft\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: An attacker on a local network can cause a denial of service\r\nDescription: An attacker on a local network can send specially\r\ncrafted IPv6 ICMP packets and cause high CPU load. The issue was\r\naddressed by rate limiting ICMP packets before verifying their\r\nchecksum.\r\nCVE-ID\r\nCVE-2011-2391 : Marc Heuse\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Kernel stack memory may be disclosed to local users\r\nDescription: An information disclosure issue existed in the msgctl\r\nand segctl APIs. This issue was addressed by initializing data\r\nstructures returned from the kernel.\r\nCVE-ID\r\nCVE-2013-5142 : Kenzley Alphonse of Kenx Technology, Inc\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Unprivileged processes could get access to the contents of\r\nkernel memory which could lead to privilege escalation\r\nDescription: An information disclosure issue existed in the\r\nmach_port_space_info API. This issue was addressed by initializing\r\nthe iin_collision field in structures returned from the kernel.\r\nCVE-ID\r\nCVE-2013-3953 : Stefan Esser\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Unprivileged processes may be able to cause an unexpected\r\nsystem termination or arbitrary code execution in the kernel\r\nDescription: A memory corruption issue existed in the handling of\r\narguments to the posix_spawn API. This issue was addressed through\r\nadditional bounds checking.\r\nCVE-ID\r\nCVE-2013-3954 : Stefan Esser\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: An unauthorized process may modify the set of loaded kernel\r\nextensions\r\nDescription: An issue existed in kextd's handling of IPC messages\r\nfrom unauthenticated senders. This issue was addressed by adding\r\nadditional authorization checks.\r\nCVE-ID\r\nCVE-2013-5145 : "Rainbow PRISM"\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Viewing a maliciously crafted web page may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: Multiple memory corruption issues existed in libxml.\r\nThese issues were addressed by updating libxml to version 2.9.0.\r\nCVE-ID\r\nCVE-2011-3102 : Juri Aedla\r\nCVE-2012-0841\r\nCVE-2012-2807 : Juri Aedla\r\nCVE-2012-5134 : Google Chrome Security Team (Juri Aedla)\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Viewing a maliciously crafted web page may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: Multiple memory corruption issues existed in libxslt.\r\nThese issues were addressed by updating libxslt to version 1.1.28.\r\nCVE-ID\r\nCVE-2012-2825 : Nicolas Gregoire\r\nCVE-2012-2870 : Nicolas Gregoire\r\nCVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, Nicolas\r\nGregoire\r\n\r\nApple TV\r\nAvailable for: Apple TV 2nd generation and later\r\nImpact: Visiting a maliciously crafted website may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: Multiple memory corruption issues existed in WebKit.\r\nThese issues were addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2013-0879 : Atte Kettunen of OUSPG\r\nCVE-2013-0991 : Jay Civelli of the Chromium development community\r\nCVE-2013-0992 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-0993 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0994 : David German of Google\r\nCVE-2013-0995 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0996 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day Initiative\r\nCVE-2013-0998 : pa_kt working with HP's Zero Day Initiative\r\nCVE-2013-0999 : pa_kt working with HP's Zero Day Initiative\r\nCVE-2013-1000 : Fermin J. Serna of the Google Security Team\r\nCVE-2013-1001 : Ryan Humenick\r\nCVE-2013-1002 : Sergey Glazunov\r\nCVE-2013-1003 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1004 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1005 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1006 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1007 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1008 : Sergey Glazunov\r\nCVE-2013-1010 : miaubiz\r\nCVE-2013-1011\r\nCVE-2013-1037 : Google Chrome Security Team\r\nCVE-2013-1038 : Google Chrome Security Team\r\nCVE-2013-1039 : own-hero Research working with iDefense VCP\r\nCVE-2013-1040 : Google Chrome Security Team\r\nCVE-2013-1041 : Google Chrome Security Team\r\nCVE-2013-1042 : Google Chrome Security Team\r\nCVE-2013-1043 : Google Chrome Security Team\r\nCVE-2013-1044 : Apple\r\nCVE-2013-1045 : Google Chrome Security Team\r\nCVE-2013-1046 : Google Chrome Security Team\r\nCVE-2013-1047 : miaubiz\r\nCVE-2013-2842 : Cyril Cattiaux\r\nCVE-2013-5125 : Google Chrome Security Team\r\nCVE-2013-5126 : Apple\r\nCVE-2013-5127 : Google Chrome Security Team\r\nCVE-2013-5128 : Apple\r\n\r\n\r\nInstallation note:\r\n\r\nApple TV will periodically check for software updates. Alternatively,\r\nyou may manually check for software updates by selecting\r\n"Settings -> General -> Update Software".\r\n\r\nTo check the current version of software, select\r\n"Settings -> General -> About".\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: http://support.apple.com/kb/HT1222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\r\nComment: GPGTools - http://gpgtools.org\r\n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\r\nXp07MGtHmSPNt4ShV2XP\r\n=G8s7\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2013-10-02T00:00:00", "published": "2013-10-02T00:00:00", "id": "SECURITYVULNS:DOC:29865", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29865", "title": "APPLE-SA-2013-09-20-1 Apple TV 6.0", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:54", "bulletinFamily": "software", "cvelist": ["CVE-2013-1045", "CVE-2013-1038", "CVE-2013-2842", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-1043", "CVE-2013-1044", "CVE-2013-5126", "CVE-2013-5125", "CVE-2012-2825", "CVE-2012-5134", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1037", "CVE-2012-2870", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1047", "CVE-2012-2807", "CVE-2014-1242", "CVE-2013-1024"], "description": "Multiple vulnerabilities on different formats parsing.", "edition": 1, "modified": "2014-01-29T00:00:00", "published": "2014-01-29T00:00:00", "id": "SECURITYVULNS:VULN:13535", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13535", "title": "Apple iTunes multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:50", "bulletinFamily": "software", "cvelist": ["CVE-2013-1045", "CVE-2013-1038", "CVE-2013-2842", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-1043", "CVE-2013-1044", "CVE-2013-5126", "CVE-2013-5125", "CVE-2012-2825", "CVE-2012-5134", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1037", "CVE-2012-2870", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1047", "CVE-2012-2807", "CVE-2014-1242", "CVE-2013-1024"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nAPPLE-SA-2014-01-22-1 iTunes 11.1.4\r\n\r\niTunes 11.1.4 is now available and addresses the following:\r\n\r\niTunes\r\nAvailable for: Mac OS X v10.6.8 or later, Windows 8, Windows 7,\r\nVista, XP SP2 or later\r\nImpact: An attacker with a privileged network position may control\r\nthe contents of the iTunes Tutorials window\r\nDescription: The contents of the iTunes Tutorials window are\r\nretrieved from the network using an unprotected HTTP connection. An\r\nattacker with a privileged network position may inject arbitrary\r\ncontents. This issue was addressed by using an encrypted HTTPS\r\nconnection to retrieve tutorials.\r\nCVE-ID\r\nCVE-2014-1242 : Apple\r\n\r\niTunes\r\nAvailable for: Windows 8, Windows 7, Vista, XP SP2 or later\r\nImpact: Viewing a maliciously crafted movie file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: An uninitialized memory access issue existed in the\r\nhandling of text tracks. This issue was addressed by additional\r\nvalidation of text tracks.\r\nCVE-ID\r\nCVE-2013-1024 : Richard Kuo and Billy Suguitan of Triemt Corporation\r\n\r\niTunes\r\nAvailable for: Windows 8, Windows 7, Vista, XP SP2 or later\r\nImpact: A man-in-the-middle attack while browsing the iTunes Store\r\nvia iTunes may lead to an unexpected application termination or\r\narbitrary code executionn\r\nDescription: Multiple memory corruption issues existed in WebKit.\r\nThese issues were addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2013-1037 : Google Chrome Security Team\r\nCVE-2013-1038 : Google Chrome Security Team\r\nCVE-2013-1039 : own-hero Research working with iDefense VCP\r\nCVE-2013-1040 : Google Chrome Security Team\r\nCVE-2013-1041 : Google Chrome Security Team\r\nCVE-2013-1042 : Google Chrome Security Team\r\nCVE-2013-1043 : Google Chrome Security Team\r\nCVE-2013-1044 : Apple\r\nCVE-2013-1045 : Google Chrome Security Team\r\nCVE-2013-1046 : Google Chrome Security Team\r\nCVE-2013-1047 : miaubiz\r\nCVE-2013-2842 : Cyril Cattiaux\r\nCVE-2013-5125 : Google Chrome Security Team\r\nCVE-2013-5126 : Apple\r\nCVE-2013-5127 : Google Chrome Security Team\r\nCVE-2013-5128 : Apple\r\n\r\nlibxml\r\nAvailable for: Windows 8, Windows 7, Vista, XP SP2 or later\r\nImpact: A man-in-the-middle attack while browsing the iTunes Store\r\nvia iTunes may lead to an unexpected application termination or\r\narbitrary code executionn\r\nDescription: Multiple memory corruption issues existed in libxml.\r\nThese issues were addressed by updating libxml to version 2.9.0.\r\nCVE-ID\r\nCVE-2011-3102 : Juri Aedla\r\nCVE-2012-0841\r\nCVE-2012-2807 : Juri Aedla\r\nCVE-2012-5134 : Google Chrome Security Team (Juri Aedla)\r\n\r\nlibxslt\r\nAvailable for: Windows 8, Windows 7, Vista, XP SP2 or later\r\nImpact: A man-in-the-middle attack while browsing the iTunes Store\r\nvia iTunes may lead to an unexpected application termination or\r\narbitrary code executionn\r\nDescription: Multiple memory corruption issues existed in libxslt.\r\nThese issues were addressed by updating libxslt to version 1.1.28.\r\nCVE-ID\r\nCVE-2012-2825 : Nicolas Gregoire\r\nCVE-2012-2870 : Nicolas Gregoire\r\nCVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, Nicolas\r\nGregoire\r\n\r\n\r\niTunes 11.1.4 may be obtained from:\r\nhttp://www.apple.com/itunes/download/\r\n\r\nFor OS X:\r\nThe download file is named: iTunes11.1.4.dmg\r\nIts SHA-1 digest is: ffde4658def154edfa479696e40588e9252e7276\r\n\r\nFor Windows XP / Vista / Windows 7 / Windows 8:\r\nThe download file is named: "iTunesSetup.exe"\r\nIts SHA-1 digest is: 3701f3e7f7c44bad05631533f2ab52e08ae0ba1f\r\n\r\nFor 64-bit Windows XP / Vista / Windows 7 / Windows 8:\r\nThe download file is named: "iTunes64Setup.exe"\r\nIts SHA-1 digest is: fd9caee83907b9f6aa01d031f63fa9ed9be2bfab\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: http://support.apple.com/kb/HT1222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\r\nComment: GPGTools - http://gpgtools.org\r\n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\r\neWabnIgZ1wYWZB0y8x5K\r\n=pK6I\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2014-01-29T00:00:00", "published": "2014-01-29T00:00:00", "id": "SECURITYVULNS:DOC:30256", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30256", "title": "APPLE-SA-2014-01-22-1 iTunes 11.1.4", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:48", "bulletinFamily": "software", "cvelist": ["CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0992", "CVE-2013-0998", "CVE-2013-1004", "CVE-2013-1013", "CVE-2013-0879", "CVE-2013-1012", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-1023", "CVE-2013-0991", "CVE-2013-0926", "CVE-2013-0994", "CVE-2013-1011", "CVE-2013-0997", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-1006", "CVE-2013-1008", "CVE-2013-0999", "CVE-2013-1009"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nAPPLE-SA-2013-06-04-2 Safari 6.0.5\r\n\r\nSafari 6.0.5 is now available and addresses the following:\r\n\r\nWebKit\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8.3\r\nImpact: Visiting a maliciously crafted website may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: Multiple memory corruption issues existed in WebKit.\r\nThese issues were addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2013-0879 : Atte Kettunen of OUSPG\r\nCVE-2013-0991 : Jay Civelli of the Chromium development community\r\nCVE-2013-0992 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-0993 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0994 : David German of Google\r\nCVE-2013-0995 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0996 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day Initiative\r\nCVE-2013-0998 : pa_kt working with HP's Zero Day Initiative\r\nCVE-2013-0999 : pa_kt working with HP's Zero Day Initiative\r\nCVE-2013-1000 : Fermin J. Serna of the Google Security Team\r\nCVE-2013-1001 : Ryan Humenick\r\nCVE-2013-1002 : Sergey Glazunov\r\nCVE-2013-1003 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1004 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1005 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1006 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1007 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1008 : Sergey Glazunov\r\nCVE-2013-1009 : Apple\r\nCVE-2013-1010 : miaubiz\r\nCVE-2013-1011 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1023 : Google Chrome Security Team (Inferno)\r\n\r\nWebKit\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8.3\r\nImpact: Visiting a maliciously crafted website may lead to a cross-\r\nsite scripting attack\r\nDescription: A cross-site scripting issue existed in the handling of\r\niframes. This issue was addressed through improved origin tracking.\r\nCVE-ID\r\nCVE-2013-1012 : Subodh Iyengar and Erling Ellingsen of Facebook\r\n\r\nWebKit\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8.3\r\nImpact: Copying and pasting a malicious HTML snippet may lead to a\r\ncross-site scripting attack\r\nDescription: A cross-site scripting issue existed in the handling of\r\ncopied and pasted data in HTML documents. This issue was addressed\r\nthrough additional validation of pasted content.\r\nCVE-ID\r\nCVE-2013-0926 : Aditya Gupta, Subho Halder, and Dev Kar of xys3c\r\n(xysec.com)\r\n\r\nWebKit\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8.3\r\nImpact: Following a maliciously crafted link could lead to\r\nunexpected behavior on the target site\r\nDescription: XSS Auditor may rewrite URLs to prevent cross-site\r\nscripting attacks. This may lead to a malicious alteration of the\r\nbehavior of a form submission. This issue was addressed through\r\nimproved validation of URLs.\r\nCVE-ID\r\nCVE-2013-1013 : Sam Power of Pentest Limited\r\n\r\n\r\nFor OS X Lion systems Safari 6.0.5 is available via\r\nthe Apple Software Update application.\r\n\r\nFor OS X Mountain Lion systems Safari 6.0.5 is included with\r\nOS X v10.8.4.\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: http://support.apple.com/kb/HT1222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\r\nComment: GPGTools - http://gpgtools.org\r\n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\r\n2YgKISKdQYxVSfkzkqYY\r\n=jk2e\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2013-06-17T00:00:00", "published": "2013-06-17T00:00:00", "id": "SECURITYVULNS:DOC:29465", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29465", "title": "APPLE-SA-2013-06-04-2 Safari 6.0.5", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:51", "bulletinFamily": "software", "cvelist": ["CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0992", "CVE-2013-0998", "CVE-2013-1004", "CVE-2013-1013", "CVE-2013-0879", "CVE-2013-1012", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-1023", "CVE-2013-0991", "CVE-2013-0926", "CVE-2013-0994", "CVE-2013-1011", "CVE-2013-0997", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-1006", "CVE-2013-1008", "CVE-2013-0999", "CVE-2013-1009"], "description": "Multiple memory corruptions and crossite scripting.", "edition": 1, "modified": "2013-06-17T00:00:00", "published": "2013-06-17T00:00:00", "id": "SECURITYVULNS:VULN:13127", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13127", "title": "WebKit / Apple Safari multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:49", "bulletinFamily": "software", "cvelist": ["CVE-2013-1045", "CVE-2013-5155", "CVE-2013-1002", "CVE-2013-5131", "CVE-2013-1005", "CVE-2013-5157", "CVE-2013-5154", "CVE-2013-5153", "CVE-2013-1038", "CVE-2013-2842", "CVE-2013-1001", "CVE-2013-1028", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-5149", "CVE-2013-1000", "CVE-2013-5140", "CVE-2013-1003", "CVE-2013-3954", "CVE-2013-0992", "CVE-2013-1043", "CVE-2013-5134", "CVE-2013-1044", "CVE-2013-0998", "CVE-2013-5126", "CVE-2013-5125", "CVE-2013-5159", "CVE-2013-1026", "CVE-2013-1004", "CVE-2013-5142", "CVE-2013-5137", "CVE-2012-2825", "CVE-2013-5156", "CVE-2013-2848", "CVE-2013-1019", "CVE-2013-3953", "CVE-2013-1025", "CVE-2013-0879", "CVE-2012-5134", "CVE-2013-1012", "CVE-2013-0993", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-5145", "CVE-2013-5152", "CVE-2013-0926", "CVE-2013-5139", "CVE-2013-0994", "CVE-2013-1036", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-5138", "CVE-2013-5150", "CVE-2013-0957", "CVE-2013-1037", "CVE-2013-0997", "CVE-2013-5147", "CVE-2013-4616", "CVE-2013-3955", "CVE-2012-2870", "CVE-2013-1010", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-5151", "CVE-2013-0996", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1006", "CVE-2013-5129", "CVE-2013-5141", "CVE-2013-1008", "CVE-2011-2391", "CVE-2013-5158", "CVE-2013-1047", "CVE-2013-0999", "CVE-2012-2807", "CVE-2013-3950"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nAPPLE-SA-2013-09-18-2 iOS 7\r\n\r\niOS 7 is now available and addresses the following:\r\n\r\nCertificate Trust Policy\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Root certificates have been updated\r\nDescription: Several certificates were added to or removed from the\r\nlist of system roots.\r\n\r\nCoreGraphics\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Viewing a maliciously crafted PDF file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow existed in the handling of JBIG2\r\nencoded data in PDF files. This issue was addressed through\r\nadditional bounds checking.\r\nCVE-ID\r\nCVE-2013-1025 : Felix Groebert of the Google Security Team\r\n\r\nCoreMedia\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Playing a maliciously crafted movie file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow existed in the handling of Sorenson\r\nencoded movie files. This issue was addressed through improved bounds\r\nchecking.\r\nCVE-ID\r\nCVE-2013-1019 : Tom Gallagher (Microsoft) & Paul Bates (Microsoft)\r\nworking with HP's Zero Day Initiative\r\n\r\nData Protection\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Apps could bypass passcode-attempt restrictions\r\nDescription: A privilege separation issue existed in Data\r\nProtection. An app within the third-party sandbox could repeatedly\r\nattempt to determine the user's passcode regardless of the user's\r\n"Erase Data" setting. This issue was addressed by requiring\r\nadditional entitlement checks.\r\nCVE-ID\r\nCVE-2013-0957 : Jin Han of the Institute for Infocomm Research\r\nworking with Qiang Yan and Su Mon Kywe of Singapore Management\r\nUniversity\r\n\r\nData Security\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: An attacker with a privileged network position may intercept\r\nuser credentials or other sensitive information\r\nDescription: TrustWave, a trusted root CA, has issued, and\r\nsubsequently revoked, a sub-CA certificate from one of its trusted\r\nanchors. This sub-CA facilitated the interception of communications\r\nsecured by Transport Layer Security (TLS). This update added the\r\ninvolved sub-CA certificate to OS X's list of untrusted certificates.\r\nCVE-ID\r\nCVE-2013-5134\r\n\r\ndyld\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: An attacker who has arbitrary code execution on a device may\r\nbe able to persist code execution across reboots\r\nDescription: Multiple buffer overflows existed in dyld's\r\nopenSharedCacheFile() function. These issues were addressed through\r\nimproved bounds checking.\r\nCVE-ID\r\nCVE-2013-3950 : Stefan Esser\r\n\r\nFile Systems\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: An attacker who can mount a non-HFS filesystem may be able\r\nto cause an unexpected system termination or arbitrary code execution\r\nwith kernel privileges\r\nDescription: A memory corruption issue existed in the handling of\r\nAppleDouble files. This issue was addressed by removing support for\r\nAppleDouble files.\r\nCVE-ID\r\nCVE-2013-3955 : Stefan Esser\r\n\r\nImageIO\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Viewing a maliciously crafted PDF file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow existed in the handling of JPEG2000\r\nencoded data in PDF files. This issue was addressed through\r\nadditional bounds checking.\r\nCVE-ID\r\nCVE-2013-1026 : Felix Groebert of the Google Security Team\r\n\r\nIOKit\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Background applications could inject user interface events\r\ninto the foreground app\r\nDescription: It was possible for background applications to inject\r\nuser interface events into the foreground application using the task\r\ncompletion or VoIP APIs. This issue was addressed by enforcing access\r\ncontrols on foreground and background processes that handle interface\r\nevents.\r\nCVE-ID\r\nCVE-2013-5137 : Mackenzie Straight at Mobile Labs\r\n\r\nIOKitUser\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: A malicious local application could cause an unexpected\r\nsystem termination\r\nDescription: A null pointer dereference existed in IOCatalogue.\r\nThe issue was addressed through additional type checking.\r\nCVE-ID\r\nCVE-2013-5138 : Will Estes\r\n\r\nIOSerialFamily\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Executing a malicious application may result in arbitrary\r\ncode execution within the kernel\r\nDescription: An out of bounds array access existed in the\r\nIOSerialFamily driver. This issue was addressed through additional\r\nbounds checking.\r\nCVE-ID\r\nCVE-2013-5139 : @dent1zt\r\n\r\nIPSec\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: An attacker may intercept data protected with IPSec Hybrid\r\nAuth\r\nDescription: The DNS name of an IPSec Hybrid Auth server was not\r\nbeing matched against the certificate, allowing an attacker with a\r\ncertificate for any server to impersonate any other. This issue was\r\naddressed by improved certificate checking.\r\nCVE-ID\r\nCVE-2013-1028 : Alexander Traud of www.traud.de\r\n\r\nKernel\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: A remote attacker can cause a device to unexpectedly restart\r\nDescription: Sending an invalid packet fragment to a device can\r\ncause a kernel assert to trigger, leading to a device restart. The\r\nissue was addressed through additional validation of packet\r\nfragments.\r\nCVE-ID\r\nCVE-2013-5140 : Joonas Kuorilehto of Codenomicon, an anonymous\r\nresearcher working with CERT-FI, Antti LevomAki and Lauri Virtanen\r\nof Vulnerability Analysis Group, Stonesoft\r\n\r\nKernel\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: A malicious local application could cause device hang\r\nDescription: An integer truncation vulnerability in the kernel\r\nsocket interface could be leveraged to force the CPU into an infinite\r\nloop. The issue was addressed by using a larger sized variable.\r\nCVE-ID\r\nCVE-2013-5141 : CESG\r\n\r\nKernel\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: An attacker on a local network can cause a denial of service\r\nDescription: An attacker on a local network can send specially\r\ncrafted IPv6 ICMP packets and cause high CPU load. The issue was\r\naddressed by rate limiting ICMP packets before verifying their\r\nchecksum.\r\nCVE-ID\r\nCVE-2011-2391 : Marc Heuse\r\n\r\nKernel\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Kernel stack memory may be disclosed to local users\r\nDescription: An information disclosure issue existed in the msgctl\r\nand segctl APIs. This issue was addressed by initializing data\r\nstructures returned from the kernel.\r\nCVE-ID\r\nCVE-2013-5142 : Kenzley Alphonse of Kenx Technology, Inc\r\n\r\nKernel\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Unprivileged processes could get access to the contents of\r\nkernel memory which could lead to privilege escalation\r\nDescription: An information disclosure issue existed in the\r\nmach_port_space_info API. This issue was addressed by initializing\r\nthe iin_collision field in structures returned from the kernel.\r\nCVE-ID\r\nCVE-2013-3953 : Stefan Esser\r\n\r\nKernel\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Unprivileged processes may be able to cause an unexpected\r\nsystem termination or arbitrary code execution in the kernel\r\nDescription: A memory corruption issue existed in the handling of\r\narguments to the posix_spawn API. This issue was addressed through\r\nadditional bounds checking.\r\nCVE-ID\r\nCVE-2013-3954 : Stefan Esser\r\n\r\nKext Management\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: An unauthorized process may modify the set of loaded kernel\r\nextensions\r\nDescription: An issue existed in kextd's handling of IPC messages\r\nfrom unauthenticated senders. This issue was addressed by adding\r\nadditional authorization checks.\r\nCVE-ID\r\nCVE-2013-5145 : "Rainbow PRISM"\r\n\r\nlibxml\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Viewing a maliciously crafted web page may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: Multiple memory corruption issues existed in libxml.\r\nThese issues were addressed by updating libxml to version 2.9.0.\r\nCVE-ID\r\nCVE-2011-3102 : Juri Aedla\r\nCVE-2012-0841\r\nCVE-2012-2807 : Juri Aedla\r\nCVE-2012-5134 : Google Chrome Security Team (Juri Aedla)\r\n\r\nlibxslt\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Viewing a maliciously crafted web page may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: Multiple memory corruption issues existed in libxslt.\r\nThese issues were addressed by updating libxslt to version 1.1.28.\r\nCVE-ID\r\nCVE-2012-2825 : Nicolas Gregoire\r\nCVE-2012-2870 : Nicolas Gregoire\r\nCVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, Nicolas\r\nGregoire\r\n\r\nPasscode Lock\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: A person with physical access to the device may be able to\r\nbypass the screen lock\r\nDescription: A race condition issue existed in the handling of phone\r\ncalls and SIM card ejection at the lock screen. This issue was\r\naddressed through improved lock state management.\r\nCVE-ID\r\nCVE-2013-5147 : videosdebarraquito\r\n\r\nPersonal Hotspot\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: An attacker may be able to join a Personal Hotspot network\r\nDescription: An issue existed in the generation of Personal Hotspot\r\npasswords, resulting in passwords that could be predicted by an\r\nattacker to join a user's Personal Hotspot. The issue was addressed\r\nby generating passwords with higher entropy.\r\nCVE-ID\r\nCVE-2013-4616 : Andreas Kurtz of NESO Security Labs and Daniel Metz\r\nof University Erlangen-Nuremberg\r\n\r\nPush Notifications\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: The push notification token may be disclosed to an app\r\ncontrary to the user's decision\r\nDescription: An information disclosure issue existed in push\r\nnotification registration. Apps requesting access to the push\r\nnotification access received the token before the user approved the\r\napp's use of push notifications. This issue was addressed by\r\nwithholding access to the token until the user has approved access.\r\nCVE-ID\r\nCVE-2013-5149 : Jack Flintermann of Grouper, Inc.\r\n\r\nSafari\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Visiting a maliciously crafted website may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A memory corruption issue existed in the handling of\r\nXML files. This issue was addressed through additional bounds\r\nchecking.\r\nCVE-ID\r\nCVE-2013-1036 : Kai Lu of Fortinet's FortiGuard Labs\r\n\r\nSafari\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: History of pages recently visited in an open tab may remain\r\nafter clearing of history\r\nDescription: Clearing Safari's history did not clear the\r\nback/forward history for open tabs. This issue was addressed by\r\nclearing the back/forward history.\r\nCVE-ID\r\nCVE-2013-5150\r\n\r\nSafari\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Viewing files on a website may lead to script execution even\r\nwhen the server sends a 'Content-Type: text/plain' header\r\nDescription: Mobile Safari sometimes treated files as HTML files\r\neven when the server sent a 'Content-Type: text/plain' header. This\r\nmay lead to cross-site scripting on sites that allow users to upload\r\nfiles. This issue was addressed through improved handling of files\r\nwhen 'Content-Type: text/plain' is set.\r\nCVE-ID\r\nCVE-2013-5151 : Ben Toews of Github\r\n\r\nSafari\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Visiting a malicious website may allow an arbitrary URL to\r\nbe displayed\r\nDescription: A URL bar spoofing issue existed in Mobile Safari. This\r\nissue was addressed through improved URL tracking.\r\nCVE-ID\r\nCVE-2013-5152 : Keita Haga of keitahaga.com, Lukasz Pilorz of RBS\r\n\r\nSandbox\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Applications that are scripts were not sandboxed\r\nDescription: Third-party applications which used the #! syntax to\r\nrun a script were sandboxed based on the identity of the script\r\ninterpreter, not the script. The interpreter may not have a sandbox\r\ndefined, leading to the application being run unsandboxed. This issue\r\nwas addressed by creating the sandbox based on the identity of the\r\nscript.\r\nCVE-ID\r\nCVE-2013-5154 : evad3rs\r\n\r\nSandbox\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Applications can cause a system hang\r\nDescription: Malicious third-party applications that wrote specific\r\nvalues to the /dev/random device could force the CPU to enter an\r\ninfinite loop. This issue was addressed by preventing third-party\r\napplications from writing to /dev/random.\r\nCVE-ID\r\nCVE-2013-5155 : CESG\r\n\r\nSocial\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Users recent Twitter activity could be disclosed on devices\r\nwith no passcode.\r\nDescription: An issue existed where it was possible to determine\r\nwhat Twitter accounts a user had recently interacted with. This issue\r\nwas resolved by restricting access to the Twitter icon cache.\r\nCVE-ID\r\nCVE-2013-5158 : Jonathan Zdziarski\r\n\r\nSpringboard\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: A person with physical access to a device in Lost Mode may\r\nbe able to view notifications\r\nDescription: An issue existed in the handling of notifications when\r\na device is in Lost Mode. This update addresses the issue with\r\nimproved lock state management.\r\nCVE-ID\r\nCVE-2013-5153 : Daniel Stangroom\r\n\r\nTelephony\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Malicious apps could interfere with or control telephony\r\nfunctionality\r\nDescription: An access control issue existed in the telephony\r\nsubsystem. Bypassing supported APIs, sandboxed apps could make\r\nrequests directly to a system daemon interfering with or controlling\r\ntelephony functionality. This issue was addressed by enforcing access\r\ncontrols on interfaces exposed by the telephony daemon.\r\nCVE-ID\r\nCVE-2013-5156 : Jin Han of the Institute for Infocomm Research\r\nworking with Qiang Yan and Su Mon Kywe of Singapore Management\r\nUniversity; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke\r\nLee from the Georgia Institute of Technology\r\n\r\nTwitter\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Sandboxed apps could send tweets without user interaction or\r\npermission\r\nDescription: An access control issue existed in the Twitter\r\nsubsystem. Bypassing supported APIs, sandboxed apps could make\r\nrequests directly to a system daemon interfering with or controlling\r\nTwitter functionality. This issue was addressed by enforcing access\r\ncontrols on interfaces exposed by the Twitter daemon.\r\nCVE-ID\r\nCVE-2013-5157 : Jin Han of the Institute for Infocomm Research\r\nworking with Qiang Yan and Su Mon Kywe of Singapore Management\r\nUniversity; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke\r\nLee from the Georgia Institute of Technology\r\n\r\nWebKit\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Visiting a maliciously crafted website may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: Multiple memory corruption issues existed in WebKit.\r\nThese issues were addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2013-0879 : Atte Kettunen of OUSPG\r\nCVE-2013-0991 : Jay Civelli of the Chromium development community\r\nCVE-2013-0992 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-0993 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0994 : David German of Google\r\nCVE-2013-0995 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0996 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day Initiative\r\nCVE-2013-0998 : pa_kt working with HP's Zero Day Initiative\r\nCVE-2013-0999 : pa_kt working with HP's Zero Day Initiative\r\nCVE-2013-1000 : Fermin J. Serna of the Google Security Team\r\nCVE-2013-1001 : Ryan Humenick\r\nCVE-2013-1002 : Sergey Glazunov\r\nCVE-2013-1003 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1004 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1005 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1006 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1007 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1008 : Sergey Glazunov\r\nCVE-2013-1010 : miaubiz\r\nCVE-2013-1037 : Google Chrome Security Team\r\nCVE-2013-1038 : Google Chrome Security Team\r\nCVE-2013-1039 : own-hero Research working with iDefense VCP\r\nCVE-2013-1040 : Google Chrome Security Team\r\nCVE-2013-1041 : Google Chrome Security Team\r\nCVE-2013-1042 : Google Chrome Security Team\r\nCVE-2013-1043 : Google Chrome Security Team\r\nCVE-2013-1044 : Apple\r\nCVE-2013-1045 : Google Chrome Security Team\r\nCVE-2013-1046 : Google Chrome Security Team\r\nCVE-2013-1047 : miaubiz\r\nCVE-2013-2842 : Cyril Cattiaux\r\nCVE-2013-5125 : Google Chrome Security Team\r\nCVE-2013-5126 : Apple\r\nCVE-2013-5127 : Google Chrome Security Team\r\nCVE-2013-5128 : Apple\r\n\r\nWebKit\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Visiting a malicious website may lead to information\r\ndisclosure\r\nDescription: An information disclosure issue existed in the handling\r\nof the window.webkitRequestAnimationFrame() API. A maliciously\r\ncrafted website could use an iframe to determine if another site used\r\nwindow.webkitRequestAnimationFrame(). This issue was addressed\r\nthrough improved handling of window.webkitRequestAnimationFrame().\r\nCVE-ID\r\nCVE-2013-5159\r\n\r\nWebKit\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Copying and pasting a malicious HTML snippet may lead to a\r\ncross-site scripting attack\r\nDescription: A cross-site scripting issue existed in the handling of\r\ncopied and pasted data in HTML documents. This issue was addressed\r\nthrough additional validation of pasted content.\r\nCVE-ID\r\nCVE-2013-0926 : Aditya Gupta, Subho Halder, and Dev Kar of xys3c\r\n(xysec.com)\r\n\r\nWebKit\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Visiting a maliciously crafted website may lead to a cross-\r\nsite scripting attack\r\nDescription: A cross-site scripting issue existed in the handling of\r\niframes. This issue was addressed through improved origin tracking.\r\nCVE-ID\r\nCVE-2013-1012 : Subodh Iyengar and Erling Ellingsen of Facebook\r\n\r\nWebKit\r\nAvailable for: iPhone 3GS and later,\r\niPod touch (4th generation) and later, iPad 2 and later\r\nImpact: Visiting a maliciously crafted website may lead to an\r\ninformation disclosure\r\nDescription: An information disclosure issue existed in XSSAuditor.\r\nThis issue was addressed through improved handling of URLs.\r\nCVE-ID\r\nCVE-2013-2848 : Egor Homakov\r\n\r\nWebKit\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Dragging or pasting a selection may lead to a cross-site\r\nscripting attack\r\nDescription: Dragging or pasting a selection from one site to\r\nanother may allow scripts contained in the selection to be executed\r\nin the context of the new site. This issue is addressed through\r\nadditional validation of content before a paste or a drag and drop\r\noperation.\r\nCVE-ID\r\nCVE-2013-5129 : Mario Heiderich\r\n\r\nWebKit\r\nAvailable for: iPhone 4 and later,\r\niPod touch (5th generation) and later, iPad 2 and later\r\nImpact: Visiting a maliciously crafted website may lead to a cross-\r\nsite scripting attack\r\nDescription: A cross-site scripting issue existed in the handling of\r\nURLs. This issue was addressed through improved origin tracking.\r\nCVE-ID\r\nCVE-2013-5131 : Erling A Ellingsen\r\n\r\n\r\nInstallation note:\r\n\r\nThis update is available through iTunes and Software Update on your\r\niOS device, and will not appear in your computer's Software Update\r\napplication, or in the Apple Downloads site. Make sure you have an\r\nInternet connection and have installed the latest version of iTunes\r\nfrom www.apple.com/itunes/\r\n\r\niTunes and Software Update on the device will automatically check\r\nApple's update server on its weekly schedule. When an update is\r\ndetected, it is downloaded and the option to be installed is\r\npresented to the user when the iOS device is docked. We recommend\r\napplying the update immediately if possible. Selecting Don't Install\r\nwill present the option the next time you connect your iOS device.\r\n\r\nThe automatic update process may take up to a week depending on the\r\nday that iTunes or the device checks for updates. You may manually\r\nobtain the update via the Check for Updates button within iTunes, or\r\nthe Software Update on your device.\r\n\r\nTo check that the iPhone, iPod touch, or iPad has been updated:\r\n\r\n* Navigate to Settings\r\n* Select General\r\n* Select About. The version after applying this update\r\nwill be "7.0".\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: http://support.apple.com/kb/HT1222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\r\nComment: GPGTools - http://gpgtools.org\r\n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\r\nGowSVGG+cJtvrngVhy3E\r\n=dNVy\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2013-10-01T00:00:00", "published": "2013-10-01T00:00:00", "id": "SECURITYVULNS:DOC:29840", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29840", "title": "APPLE-SA-2013-09-18-2 iOS 7", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:52", "bulletinFamily": "software", "cvelist": ["CVE-2013-1045", "CVE-2013-5155", "CVE-2013-1002", "CVE-2013-5131", "CVE-2013-1005", "CVE-2013-5157", "CVE-2013-5154", "CVE-2013-5153", "CVE-2013-1038", "CVE-2013-2842", "CVE-2013-1001", "CVE-2013-1028", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-5149", "CVE-2013-5140", "CVE-2013-1003", "CVE-2013-3954", "CVE-2013-0992", "CVE-2013-1043", "CVE-2013-5134", "CVE-2013-1044", "CVE-2013-0998", "CVE-2013-5126", "CVE-2013-5125", "CVE-2013-5159", "CVE-2013-1026", "CVE-2013-1004", "CVE-2013-5142", "CVE-2013-5137", "CVE-2012-2825", "CVE-2013-5156", "CVE-2013-2848", "CVE-2013-1019", "CVE-2013-3953", "CVE-2013-1025", "CVE-2013-0879", "CVE-2012-5134", "CVE-2013-1012", "CVE-2013-0993", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-5160", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-5145", "CVE-2013-5152", "CVE-2013-5161", "CVE-2013-0926", "CVE-2013-5139", "CVE-2013-0994", "CVE-2013-1036", "CVE-2013-1046", "CVE-2013-5138", "CVE-2013-5150", "CVE-2013-0957", "CVE-2013-1037", "CVE-2013-0997", "CVE-2013-5147", "CVE-2013-4616", "CVE-2013-3955", "CVE-2012-2870", "CVE-2013-1010", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-5151", "CVE-2013-0996", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1006", "CVE-2013-5129", "CVE-2013-5141", "CVE-2013-1008", "CVE-2011-2391", "CVE-2013-5158", "CVE-2013-1047", "CVE-2013-0999", "CVE-2012-2807", "CVE-2013-3950"], "description": "Multiple vulnerabilities in different system components.", "edition": 1, "modified": "2013-12-09T00:00:00", "published": "2013-12-09T00:00:00", "id": "SECURITYVULNS:VULN:13297", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13297", "title": "Apple iPhone / iPad multiple securit vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:48", "bulletinFamily": "software", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0951", "CVE-2012-2857", "CVE-2013-0992", "CVE-2013-0998", "CVE-2012-3748", "CVE-2013-0953", "CVE-2013-1004", "CVE-2012-2824", "CVE-2013-0959", "CVE-2013-0879", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0954", "CVE-2013-0994", "CVE-2013-0950", "CVE-2013-0961", "CVE-2013-1011", "CVE-2013-0952", "CVE-2013-0997", "CVE-2012-5112", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-0912", "CVE-2013-0956", "CVE-2013-1006", "CVE-2013-0948", "CVE-2013-1008", "CVE-2013-0958", "CVE-2013-0960", "CVE-2013-0999", "CVE-2013-0949", "CVE-2013-0955"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nAPPLE-SA-2013-05-16-1 iTunes 11.0.3\r\n\r\niTunes 11.0.3 is now available and addresses the following:\r\n\r\niTunes\r\nAvailable for: Mac OS X v10.6.8 or later, Windows 7, Vista,\r\nXP SP2 or later\r\nImpact: An attacker in a privileged network position may manipulate\r\nHTTPS server certificates, leading to the disclosure of sensitive\r\ninformation\r\nDescription: A certificate validation issue existed in iTunes. In\r\ncertain contexts, an active network attacker could present untrusted\r\ncertificates to iTunes and they would be accepted without warning.\r\nThis issue was resolved by improved certificate validation.\r\nCVE-ID\r\nCVE-2013-1014 : Christopher of ThinkSECURE Pte Ltd, Christopher\r\nHickstein of University of Minnesota\r\n\r\niTunes\r\nAvailable for: Windows 7, Vista, XP SP2 or later\r\nImpact: A man-in-the-middle attack while browsing the iTunes Store\r\nvia iTunes may lead to an unexpected application termination or\r\narbitrary code executionn\r\nDescription: Multiple memory corruption issues existed in WebKit.\r\nThese issues were addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2012-2824 : miaubiz\r\nCVE-2012-2857 : Arthur Gerkis\r\nCVE-2012-3748 : Joost Pol and Daan Keuper of Certified Secure working\r\nwith HP TippingPoint's Zero Day Initiative\r\nCVE-2012-5112 : Pinkie Pie working with Google's Pwnium 2 contest\r\nCVE-2013-0879 : Atte Kettunen of OUSPG\r\nCVE-2013-0912 : Nils and Jon from MWR Labs working with HP\r\nTippingPoint's Zero Day Initiative\r\nCVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security\r\nTeam\r\nCVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security\r\nTeam\r\nCVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security\r\nTeam\r\nCVE-2013-0951 : Apple\r\nCVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security\r\nTeam\r\nCVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security\r\nTeam\r\nCVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the\r\nGoogle Chrome Security Team\r\nCVE-2013-0955 : Apple\r\nCVE-2013-0956 : Apple Product Security\r\nCVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security\r\nTeam\r\nCVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security\r\nTeam\r\nCVE-2013-0960 : Apple\r\nCVE-2013-0961 : wushi of team509 working with iDefense VCP\r\nCVE-2013-0991 : Jay Civelli of the Chromium development community\r\nCVE-2013-0992 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-0993 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0994 : David German of Google\r\nCVE-2013-0995 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0996 : Google Chrome Security Team (Inferno)\r\nCVE-2013-0997 : Vitaliy Toropov working with HP TippingPoint's Zero\r\nDay Initiative\r\nCVE-2013-0998 : pa_kt working with HP TippingPoint's Zero Day\r\nInitiative\r\nCVE-2013-0999 : pa_kt working with HP TippingPoint's Zero Day\r\nInitiative\r\nCVE-2013-1000 : Fermin J. Serna of the Google Security Team\r\nCVE-2013-1001 : Ryan Humenick\r\nCVE-2013-1002 : Sergey Glazunov\r\nCVE-2013-1003 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1004 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1005 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1006 : Google Chrome Security Team (Martin Barbella)\r\nCVE-2013-1007 : Google Chrome Security Team (Inferno)\r\nCVE-2013-1008 : Sergey Glazunov\r\nCVE-2013-1010 : miaubiz\r\nCVE-2013-1011 : Google Chrome Security Team (Inferno)\r\n\r\n\r\niTunes 11.0.3 may be obtained from:\r\nhttp://www.apple.com/itunes/download/\r\n\r\nFor OS X:\r\nThe download file is named: "iTunes11.0.3.dmg"\r\nIts SHA-1 digest is: 83f4afc5d3b5698c811c87c27b975824116bbf1d\r\n\r\nFor Windows XP / Vista / Windows 7:\r\nThe download file is named: "iTunesSetup.exe"\r\nIts SHA-1 digest is: 1e95101b584762b3c46ab597c115cd86bfd45d64\r\n\r\nFor 64-bit Windows XP / Vista / Windows 7:\r\nThe download file is named: "iTunes64Setup.exe"\r\nIts SHA-1 digest is: 6669044bd50c1f753c8412a02556a70be09fd9f8\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: http://support.apple.com/kb/HT1222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\r\nComment: GPGTools - http://gpgtools.org\r\n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\r\n9M/53y+vsPwrcmmXCS3o\r\n=eN5K\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2013-05-27T00:00:00", "published": "2013-05-27T00:00:00", "id": "SECURITYVULNS:DOC:29426", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29426", "title": "APPLE-SA-2013-05-16-1 iTunes 11.0.3", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:51", "bulletinFamily": "software", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0951", "CVE-2012-2857", "CVE-2013-0992", "CVE-2013-0998", "CVE-2012-3748", "CVE-2013-0953", "CVE-2013-1004", "CVE-2012-2824", "CVE-2013-0959", "CVE-2013-0879", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0954", "CVE-2013-0994", "CVE-2013-0950", "CVE-2013-0961", "CVE-2013-1011", "CVE-2013-0952", "CVE-2013-0997", "CVE-2012-5112", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-0912", "CVE-2013-0956", "CVE-2013-1006", "CVE-2013-0948", "CVE-2013-1008", "CVE-2013-0958", "CVE-2013-0960", "CVE-2013-0999", "CVE-2013-0949", "CVE-2013-0955"], "description": "Certificate validation vulnerability, multiple memory corruptions.", "edition": 1, "modified": "2013-05-27T00:00:00", "published": "2013-05-27T00:00:00", "id": "SECURITYVULNS:VULN:13092", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13092", "title": "Apple iTunes multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-01T01:21:23", "description": "According to its banner, the remote Apple TV 2nd generation or later\ndevice is prior to 6.0. It is, therefore, reportedly affected by\nmultiple vulnerabilities, the most serious issues of which could\nresult in arbitrary code execution.", "edition": 24, "published": "2013-10-01T00:00:00", "title": "Apple TV < 6.0 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1045", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1038", "CVE-2013-2842", "CVE-2013-1001", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-1000", "CVE-2013-5140", "CVE-2013-1003", "CVE-2013-3954", "CVE-2013-0992", "CVE-2013-1043", "CVE-2013-1044", "CVE-2013-0998", "CVE-2013-5126", "CVE-2013-5125", "CVE-2013-1026", "CVE-2013-1004", "CVE-2013-5142", "CVE-2012-2825", "CVE-2013-1019", "CVE-2013-3953", "CVE-2013-1025", "CVE-2013-0879", "CVE-2012-5134", "CVE-2013-0993", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-5145", "CVE-2013-5139", "CVE-2013-0994", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1011", "CVE-2013-5138", "CVE-2013-1037", "CVE-2013-0997", "CVE-2012-2870", "CVE-2013-1010", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-0996", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1006", "CVE-2013-1008", "CVE-2011-2391", "CVE-2013-1047", "CVE-2013-0999", "CVE-2012-2807", "CVE-2013-3950"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:apple_tv"], "id": "APPLETV_6_0.NASL", "href": "https://www.tenable.com/plugins/nessus/70257", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(70257);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2011-2391\",\n \"CVE-2011-3102\",\n \"CVE-2012-0841\",\n \"CVE-2012-2807\",\n \"CVE-2012-2825\",\n \"CVE-2012-2870\",\n \"CVE-2012-2871\",\n \"CVE-2012-5134\",\n \"CVE-2013-0879\",\n \"CVE-2013-0991\",\n \"CVE-2013-0992\",\n \"CVE-2013-0993\",\n \"CVE-2013-0994\",\n \"CVE-2013-0995\",\n \"CVE-2013-0996\",\n \"CVE-2013-0997\",\n \"CVE-2013-0998\",\n \"CVE-2013-0999\",\n \"CVE-2013-1000\",\n \"CVE-2013-1001\",\n \"CVE-2013-1002\",\n \"CVE-2013-1003\",\n \"CVE-2013-1004\",\n \"CVE-2013-1005\",\n \"CVE-2013-1006\",\n \"CVE-2013-1007\",\n \"CVE-2013-1008\",\n \"CVE-2013-1010\",\n \"CVE-2013-1011\",\n \"CVE-2013-1019\",\n \"CVE-2013-1025\",\n \"CVE-2013-1026\",\n \"CVE-2013-1037\",\n \"CVE-2013-1038\",\n \"CVE-2013-1039\",\n \"CVE-2013-1040\",\n \"CVE-2013-1041\",\n \"CVE-2013-1042\",\n \"CVE-2013-1043\",\n \"CVE-2013-1044\",\n \"CVE-2013-1045\",\n \"CVE-2013-1046\",\n \"CVE-2013-1047\",\n \"CVE-2013-2842\",\n \"CVE-2013-3950\",\n \"CVE-2013-3953\",\n \"CVE-2013-3954\",\n \"CVE-2013-5125\",\n \"CVE-2013-5126\",\n \"CVE-2013-5127\",\n \"CVE-2013-5128\",\n \"CVE-2013-5138\",\n \"CVE-2013-5139\",\n \"CVE-2013-5140\",\n \"CVE-2013-5142\",\n \"CVE-2013-5145\"\n );\n script_bugtraq_id(\n 52107,\n 53540,\n 54203,\n 54718,\n 55331,\n 56684,\n 59326,\n 59944,\n 59953,\n 59954,\n 59955,\n 59956,\n 59957,\n 59958,\n 59959,\n 59960,\n 59963,\n 59964,\n 59965,\n 59967,\n 59970,\n 59971,\n 59972,\n 59973,\n 59974,\n 59976,\n 59977,\n 60067,\n 60102,\n 60437,\n 60441,\n 60444,\n 62368,\n 62369,\n 62520,\n 62522,\n 62524,\n 62529,\n 62531,\n 62536,\n 62551,\n 62553,\n 62554,\n 62556,\n 62557,\n 62558,\n 62559,\n 62560,\n 62563,\n 62565,\n 62567,\n 62568,\n 62569,\n 62570,\n 62571\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2013-09-20-1\");\n\n script_name(english:\"Apple TV < 6.0 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version in banner\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its banner, the remote Apple TV 2nd generation or later\ndevice is prior to 6.0. It is, therefore, reportedly affected by\nmultiple vulnerabilities, the most serious issues of which could\nresult in arbitrary code execution.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.apple.com/en-us/HT202815\");\n script_set_attribute(attribute:\"see_also\", value:\"https://lists.apple.com/archives/security-announce/2013/Sep/msg00008.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/528762/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple TV 6.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-5139\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/02/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/10/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:apple_tv\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"appletv_detect.nasl\");\n script_require_keys(\"www/appletv\");\n script_require_ports(3689);\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\n\nport = 3689;\nbanner = get_http_banner(port:port, broken:TRUE, exit_on_fail:TRUE);\nif (\n \"DAAP-Server: iTunes/\" >!< banner &&\n \"RIPT-Server: iTunesLib/\" >!< banner\n) audit(AUDIT_WRONG_WEB_SERVER, port, 'iTunes');\n\npat = \"^DAAP-Server: iTunes/([0-9][0-9.]+)([a-z])([0-9]+) \\((Mac )?OS X\\)\";\nmatches = egrep(pattern:pat, string:banner);\n\nif (\n \"DAAP-Server: iTunes/\" >< banner &&\n isnull(matches)\n) exit(0, \"The web server listening on port \"+port+\" does not appear to be from iTunes on an Apple TV.\");\n\n\nfixed_major = \"11.1\";\nfixed_char = \"b\";\nfixed_minor = \"37\";\n\nreport = \"\";\n\n# Check first for 3rd gen and recent 2nd gen models.\nif (matches)\n{\n foreach line (split(matches, keep:FALSE))\n {\n match = eregmatch(pattern:pat, string:line);\n if (!isnull(match))\n {\n major = match[1];\n char = match[2];\n minor = int(match[3]);\n\n if (\n ver_compare(ver:major, fix:fixed_major, strict:FALSE) < 0 ||\n (\n ver_compare(ver:major, fix:fixed_major, strict:FALSE) == 0 &&\n (\n ord(char) < ord(fixed_char) ||\n (\n ord(char) == ord(fixed_char) &&\n minor < fixed_minor\n )\n )\n )\n )\n {\n report = '\\n Source : ' + line +\n '\\n Installed iTunes version : ' + major + char + minor +\n '\\n Fixed iTunes version : ' + fixed_major + fixed_char + fixed_minor +\n '\\n';\n }\n break;\n }\n }\n}\nelse\n{\n pat2 = \"^RIPT-Server: iTunesLib/([0-9]+)\\.\";\n matches = egrep(pattern:pat2, string:banner);\n if (matches)\n {\n foreach line (split(matches, keep:FALSE))\n {\n match = eregmatch(pattern:pat2, string:line);\n if (!isnull(match))\n {\n major = int(match[1]);\n if (major < 4) exit(0, \"The web server listening on port \"+port+\" is from iTunes on a 1st generation Apple TV, which is no longer supported.\");\n else if (major >= 4 && major <= 9)\n {\n report = '\\n Source : ' + line +\n '\\n';\n }\n break;\n }\n }\n }\n}\n\n\nif (report)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:report);\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:17:33", "description": "The version of Apple iTunes installed on the remote Windows host is\nolder than 11.1.4. It is, therefore, potentially affected by several\nissues :\n\n - The included versions of WebKit, libxml, and libxslt\n contain several errors that could lead to memory\n corruption and possibly arbitrary code execution. The\n vendor notes that one possible attack vector is a\n man-in-the-middle attack while the application browses\n the 'iTunes Store'. (CVE-2011-3102, CVE-2012-0841,\n CVE-2012-2807, CVE-2012-2825, CVE-2012-2870,\n CVE-2012-2871, CVE-2012-5134, CVE-2013-1037,\n CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,\n CVE-2013-1041, CVE-2013-1042, CVE-2013-1043,\n CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,\n CVE-2013-1047, CVE-2013-2842, CVE-2013-5125,\n CVE-2013-5126, CVE-2013-5127, CVE-2013-5128)\n\n - An error exists related to text tracks in movie files\n that could allow denial of service or arbitrary code\n execution. (CVE-2013-1024)\n\n - An error exists related to the iTunes Tutorials window\n that could allow an attacker in a privileged network\n location to inject content. (CVE-2014-1242)", "edition": 25, "published": "2014-01-23T00:00:00", "title": "Apple iTunes < 11.1.4 Multiple Vulnerabilities (credentialed check)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1045", "CVE-2013-1038", "CVE-2013-2842", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-1043", "CVE-2013-1044", "CVE-2013-5126", "CVE-2013-5125", "CVE-2012-2825", "CVE-2012-5134", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1037", "CVE-2012-2870", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1047", "CVE-2012-2807", "CVE-2014-1242", "CVE-2013-1024"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:itunes"], "id": "ITUNES_11_1_4.NASL", "href": "https://www.tenable.com/plugins/nessus/72104", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(72104);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\n \"CVE-2011-3102\",\n \"CVE-2012-0841\",\n \"CVE-2012-2807\",\n \"CVE-2012-2825\",\n \"CVE-2012-2870\",\n \"CVE-2012-2871\",\n \"CVE-2012-5134\",\n \"CVE-2013-1024\",\n \"CVE-2013-1037\",\n \"CVE-2013-1038\",\n \"CVE-2013-1039\",\n \"CVE-2013-1040\",\n \"CVE-2013-1041\",\n \"CVE-2013-1042\",\n \"CVE-2013-1043\",\n \"CVE-2013-1044\",\n \"CVE-2013-1045\",\n \"CVE-2013-1046\",\n \"CVE-2013-1047\",\n \"CVE-2013-2842\",\n \"CVE-2013-5125\",\n \"CVE-2013-5126\",\n \"CVE-2013-5127\",\n \"CVE-2013-5128\",\n \"CVE-2014-1242\"\n );\n script_bugtraq_id(\n 52107,\n 53540,\n 54203,\n 54718,\n 55331,\n 56684,\n 60067,\n 60368,\n 62551,\n 62553,\n 62554,\n 62556,\n 62557,\n 62558,\n 62559,\n 62560,\n 62563,\n 62565,\n 62567,\n 62568,\n 62569,\n 62570,\n 62571,\n 65088\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2014-01-22-1\");\n\n script_name(english:\"Apple iTunes < 11.1.4 Multiple Vulnerabilities (credentialed check)\");\n script_summary(english:\"Checks version of iTunes on Windows\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains an application that has multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple iTunes installed on the remote Windows host is\nolder than 11.1.4. It is, therefore, potentially affected by several\nissues :\n\n - The included versions of WebKit, libxml, and libxslt\n contain several errors that could lead to memory\n corruption and possibly arbitrary code execution. The\n vendor notes that one possible attack vector is a\n man-in-the-middle attack while the application browses\n the 'iTunes Store'. (CVE-2011-3102, CVE-2012-0841,\n CVE-2012-2807, CVE-2012-2825, CVE-2012-2870,\n CVE-2012-2871, CVE-2012-5134, CVE-2013-1037,\n CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,\n CVE-2013-1041, CVE-2013-1042, CVE-2013-1043,\n CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,\n CVE-2013-1047, CVE-2013-2842, CVE-2013-5125,\n CVE-2013-5126, CVE-2013-5127, CVE-2013-5128)\n\n - An error exists related to text tracks in movie files\n that could allow denial of service or arbitrary code\n execution. (CVE-2013-1024)\n\n - An error exists related to the iTunes Tutorials window\n that could allow an attacker in a privileged network\n location to inject content. (CVE-2014-1242)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT6001\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/530870/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple iTunes 11.1.4 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-2842\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/10/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:itunes\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"itunes_detect.nasl\");\n script_require_keys(\"SMB/iTunes/Version\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n\nversion = get_kb_item_or_exit(\"SMB/iTunes/Version\");\npath = get_kb_item_or_exit(\"SMB/iTunes/Path\");\n\nfixed_version = \"11.1.4.62\";\nif (ver_compare(ver:version, fix:fixed_version) < 0)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : '+path+\n '\\n Installed version : '+version+\n '\\n Fixed version : '+fixed_version+'\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"iTunes\", version, path);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T03:17:33", "description": "The version of Apple iTunes on the remote host is prior to version\n11.1.4. It is, therefore, affected by multiple vulnerabilities :\n\n - The included versions of the WebKit, libxml, and libxslt\n components in iTunes contain several errors that can\n lead to memory corruption and arbitrary code execution.\n The vendor states that one possible vector is a man-in-\n the-middle attack while the application browses the\n 'iTunes Store'. Please note that these vulnerabilities\n only affect the application when it is running on a\n Windows host. (CVE-2011-3102, CVE-2012-0841,\n CVE-2012-2807, CVE-2012-2825, CVE-2012-2870,\n CVE-2012-2871, CVE-2012-5134, CVE-2013-1037,\n CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,\n CVE-2013-1041, CVE-2013-1042, CVE-2013-1043,\n CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,\n CVE-2013-1047, CVE-2013-2842, CVE-2013-5125,\n CVE-2013-5126, CVE-2013-5127, CVE-2013-5128)\n\n - An uninitialized memory access error exists in the\n handling of text tracks. By using a specially crafted\n movie file, a remote attacker can exploit this to cause\n a denial of service or execute arbitrary code.\n (CVE-2013-1024)\n\n - An error exists related to the iTunes Tutorials window\n that can allow an attacker in a privileged network\n location to inject content. Note that this vulnerability\n only affects the application installed on a Mac OS X\n host. (CVE-2014-1242)", "edition": 25, "published": "2014-01-23T00:00:00", "title": "Apple iTunes < 11.1.4 Multiple Vulnerabilities (uncredentialed check)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1045", "CVE-2013-1038", "CVE-2013-2842", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-1043", "CVE-2013-1044", "CVE-2013-5126", "CVE-2013-5125", "CVE-2012-2825", "CVE-2012-5134", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1037", "CVE-2012-2870", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1047", "CVE-2012-2807", "CVE-2014-1242", "CVE-2013-1024"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:itunes"], "id": "ITUNES_11_1_4_BANNER.NASL", "href": "https://www.tenable.com/plugins/nessus/72105", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(72105);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\n \"CVE-2011-3102\",\n \"CVE-2012-0841\",\n \"CVE-2012-2807\",\n \"CVE-2012-2825\",\n \"CVE-2012-2870\",\n \"CVE-2012-2871\",\n \"CVE-2012-5134\",\n \"CVE-2013-1024\",\n \"CVE-2013-1037\",\n \"CVE-2013-1038\",\n \"CVE-2013-1039\",\n \"CVE-2013-1040\",\n \"CVE-2013-1041\",\n \"CVE-2013-1042\",\n \"CVE-2013-1043\",\n \"CVE-2013-1044\",\n \"CVE-2013-1045\",\n \"CVE-2013-1046\",\n \"CVE-2013-1047\",\n \"CVE-2013-2842\",\n \"CVE-2013-5125\",\n \"CVE-2013-5126\",\n \"CVE-2013-5127\",\n \"CVE-2013-5128\",\n \"CVE-2014-1242\"\n );\n script_bugtraq_id(\n 52107,\n 53540,\n 54203,\n 54718,\n 55331,\n 56684,\n 60067,\n 60368,\n 62551,\n 62553,\n 62554,\n 62556,\n 62557,\n 62558,\n 62559,\n 62560,\n 62563,\n 62565,\n 62567,\n 62568,\n 62569,\n 62570,\n 62571,\n 65088\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2014-01-22-1\");\n\n script_name(english:\"Apple iTunes < 11.1.4 Multiple Vulnerabilities (uncredentialed check)\");\n script_summary(english:\"Checks the version of iTunes.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a multimedia application that has multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple iTunes on the remote host is prior to version\n11.1.4. It is, therefore, affected by multiple vulnerabilities :\n\n - The included versions of the WebKit, libxml, and libxslt\n components in iTunes contain several errors that can\n lead to memory corruption and arbitrary code execution.\n The vendor states that one possible vector is a man-in-\n the-middle attack while the application browses the\n 'iTunes Store'. Please note that these vulnerabilities\n only affect the application when it is running on a\n Windows host. (CVE-2011-3102, CVE-2012-0841,\n CVE-2012-2807, CVE-2012-2825, CVE-2012-2870,\n CVE-2012-2871, CVE-2012-5134, CVE-2013-1037,\n CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,\n CVE-2013-1041, CVE-2013-1042, CVE-2013-1043,\n CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,\n CVE-2013-1047, CVE-2013-2842, CVE-2013-5125,\n CVE-2013-5126, CVE-2013-5127, CVE-2013-5128)\n\n - An uninitialized memory access error exists in the\n handling of text tracks. By using a specially crafted\n movie file, a remote attacker can exploit this to cause\n a denial of service or execute arbitrary code.\n (CVE-2013-1024)\n\n - An error exists related to the iTunes Tutorials window\n that can allow an attacker in a privileged network\n location to inject content. Note that this vulnerability\n only affects the application installed on a Mac OS X\n host. (CVE-2014-1242)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT6001\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/530870/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple iTunes 11.1.4 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-2842\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/10/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:itunes\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Peer-To-Peer File Sharing\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"itunes_sharing.nasl\");\n script_require_keys(\"iTunes/sharing\");\n script_require_ports(\"Services/www\", 3689);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:3689, embedded:TRUE, ignore_broken:TRUE);\n\nget_kb_item_or_exit(\"iTunes/\" + port + \"/enabled\");\n\ntype = get_kb_item_or_exit(\"iTunes/\" + port + \"/type\");\nsource = get_kb_item_or_exit(\"iTunes/\" + port + \"/source\");\nversion = get_kb_item_or_exit(\"iTunes/\" + port + \"/version\");\n\nif (type == 'AppleTV') audit(AUDIT_LISTEN_NOT_VULN, \"iTunes on AppleTV\", port, version);\n\nfixed_version = \"11.1.4\";\n\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Version source : ' + source +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version + '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"iTunes\", port, version);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T03:17:28", "description": "The version of Apple iTunes installed on the remote Windows host is\nolder than 11.1.2. It is, therefore, potentially affected by several\nissues :\n\n - An uninitialized memory access issue exists in the\n handling of text tracks, which could lead to memory\n corruption and possibly arbitrary code execution.\n (CVE-2013-1024)\n\n - The included versions of WebKit, libxml, and libxslt\n contain several errors that could lead to memory\n corruption and possibly arbitrary code execution. The\n vendor notes that one possible attack vector is a\n man-in-the-middle attack while the application browses\n the 'iTunes Store'.\n (CVE-2011-3102, CVE-2012-0841, CVE-2012-2807,\n CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,\n CVE-2012-5134, CVE-2013-1037, CVE-2013-1038,\n CVE-2013-1039, CVE-2013-1040, CVE-2013-1041,\n CVE-2013-1042, CVE-2013-1043, CVE-2013-1044,\n CVE-2013-1045, CVE-2013-1046, CVE-2013-1047,\n CVE-2013-2842, CVE-2013-5125, CVE-2013-5126,\n CVE-2013-5127, CVE-2013-5128)", "edition": 25, "published": "2013-10-24T00:00:00", "title": "Apple iTunes < 11.1.2 Multiple Vulnerabilities (credentialed check)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1045", "CVE-2013-1038", "CVE-2013-2842", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-1043", "CVE-2013-1044", "CVE-2013-5126", "CVE-2013-5125", "CVE-2012-2825", "CVE-2012-5134", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1037", "CVE-2012-2870", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1047", "CVE-2012-2807", "CVE-2013-1024"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:itunes"], "id": "ITUNES_11_1_2.NASL", "href": "https://www.tenable.com/plugins/nessus/70588", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(70588);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2011-3102\",\n \"CVE-2012-0841\",\n \"CVE-2012-2807\",\n \"CVE-2012-2825\",\n \"CVE-2012-2870\",\n \"CVE-2012-2871\",\n \"CVE-2012-5134\",\n \"CVE-2013-1024\",\n \"CVE-2013-1037\",\n \"CVE-2013-1038\",\n \"CVE-2013-1039\",\n \"CVE-2013-1040\",\n \"CVE-2013-1041\",\n \"CVE-2013-1042\",\n \"CVE-2013-1043\",\n \"CVE-2013-1044\",\n \"CVE-2013-1045\",\n \"CVE-2013-1046\",\n \"CVE-2013-1047\",\n \"CVE-2013-2842\",\n \"CVE-2013-5125\",\n \"CVE-2013-5126\",\n \"CVE-2013-5127\",\n \"CVE-2013-5128\"\n );\n script_bugtraq_id(\n 52107,\n 53540,\n 54203,\n 54718,\n 55331,\n 56684,\n 60067,\n 60368,\n 62551,\n 62553,\n 62554,\n 62556,\n 62557,\n 62558,\n 62559,\n 62560,\n 62563,\n 62565,\n 62567,\n 62568,\n 62569,\n 62570,\n 62571\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2013-10-22-8\");\n\n script_name(english:\"Apple iTunes < 11.1.2 Multiple Vulnerabilities (credentialed check)\");\n script_summary(english:\"Checks version of iTunes on Windows\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains an application that has multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple iTunes installed on the remote Windows host is\nolder than 11.1.2. It is, therefore, potentially affected by several\nissues :\n\n - An uninitialized memory access issue exists in the\n handling of text tracks, which could lead to memory\n corruption and possibly arbitrary code execution.\n (CVE-2013-1024)\n\n - The included versions of WebKit, libxml, and libxslt\n contain several errors that could lead to memory\n corruption and possibly arbitrary code execution. The\n vendor notes that one possible attack vector is a\n man-in-the-middle attack while the application browses\n the 'iTunes Store'.\n (CVE-2011-3102, CVE-2012-0841, CVE-2012-2807,\n CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,\n CVE-2012-5134, CVE-2013-1037, CVE-2013-1038,\n CVE-2013-1039, CVE-2013-1040, CVE-2013-1041,\n CVE-2013-1042, CVE-2013-1043, CVE-2013-1044,\n CVE-2013-1045, CVE-2013-1046, CVE-2013-1047,\n CVE-2013-2842, CVE-2013-5125, CVE-2013-5126,\n CVE-2013-5127, CVE-2013-5128)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT6001\");\n script_set_attribute(attribute:\"see_also\", value:\"https://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple iTunes 11.1.2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-2842\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/10/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/10/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:itunes\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"itunes_detect.nasl\");\n script_require_keys(\"SMB/iTunes/Version\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n\nversion = get_kb_item_or_exit(\"SMB/iTunes/Version\");\nfixed_version = \"11.1.2.31\";\npath = get_kb_item_or_exit(\"SMB/iTunes/Path\");\n\nif (ver_compare(ver:version, fix:fixed_version) == -1)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : '+path+\n '\\n Installed version : '+version+\n '\\n Fixed version : '+fixed_version+'\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"iTunes\", version, path);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T03:17:31", "description": "The version of Apple iTunes on the remote host is prior to version\n11.1.2. It is, therefore, affected by multiple vulnerabilities :\n\n - An uninitialized memory access error exists in the\n handling of text tracks. By using a specially crafted\n movie file, a remote attacker can exploit this to cause\n a denial of service or execute arbitrary code.\n (CVE-2013-1024)\n\n - The included versions of the WebKit, libxml, and libxslt\n components in iTunes contain several errors that can\n lead to memory corruption and arbitrary code execution.\n The vendor states that one possible vector is a man-in-\n the-middle attack while the application browses the\n 'iTunes Store'.\n (CVE-2011-3102, CVE-2012-0841, CVE-2012-2807,\n CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,\n CVE-2012-5134, CVE-2013-1037, CVE-2013-1038,\n CVE-2013-1039, CVE-2013-1040, CVE-2013-1041,\n CVE-2013-1042, CVE-2013-1043, CVE-2013-1044,\n CVE-2013-1045, CVE-2013-1046, CVE-2013-1047,\n CVE-2013-2842, CVE-2013-5125, CVE-2013-5126,\n CVE-2013-5127, CVE-2013-5128)", "edition": 25, "published": "2013-10-24T00:00:00", "title": "Apple iTunes < 11.1.2 Multiple Vulnerabilities (uncredentialed check)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1045", "CVE-2013-1038", "CVE-2013-2842", "CVE-2012-2871", "CVE-2013-1040", "CVE-2013-1043", "CVE-2013-1044", "CVE-2013-5126", "CVE-2013-5125", "CVE-2012-2825", "CVE-2012-5134", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1037", "CVE-2012-2870", "CVE-2013-1039", "CVE-2011-3102", "CVE-2013-5127", "CVE-2012-0841", "CVE-2013-1047", "CVE-2012-2807", "CVE-2013-1024"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:itunes"], "id": "ITUNES_11_1_2_BANNER.NASL", "href": "https://www.tenable.com/plugins/nessus/70589", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(70589);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2011-3102\",\n \"CVE-2012-0841\",\n \"CVE-2012-2807\",\n \"CVE-2012-2825\",\n \"CVE-2012-2870\",\n \"CVE-2012-2871\",\n \"CVE-2012-5134\",\n \"CVE-2013-1024\",\n \"CVE-2013-1037\",\n \"CVE-2013-1038\",\n \"CVE-2013-1039\",\n \"CVE-2013-1040\",\n \"CVE-2013-1041\",\n \"CVE-2013-1042\",\n \"CVE-2013-1043\",\n \"CVE-2013-1044\",\n \"CVE-2013-1045\",\n \"CVE-2013-1046\",\n \"CVE-2013-1047\",\n \"CVE-2013-2842\",\n \"CVE-2013-5125\",\n \"CVE-2013-5126\",\n \"CVE-2013-5127\",\n \"CVE-2013-5128\"\n );\n script_bugtraq_id(\n 52107,\n 53540,\n 54203,\n 54718,\n 55331,\n 56684,\n 60067,\n 60368,\n 62551,\n 62553,\n 62554,\n 62556,\n 62557,\n 62558,\n 62559,\n 62560,\n 62563,\n 62565,\n 62567,\n 62568,\n 62569,\n 62570,\n 62571\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2013-10-22-8\");\n\n script_name(english:\"Apple iTunes < 11.1.2 Multiple Vulnerabilities (uncredentialed check)\");\n script_summary(english:\"Checks the version of iTunes.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a multimedia application that has multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple iTunes on the remote host is prior to version\n11.1.2. It is, therefore, affected by multiple vulnerabilities :\n\n - An uninitialized memory access error exists in the\n handling of text tracks. By using a specially crafted\n movie file, a remote attacker can exploit this to cause\n a denial of service or execute arbitrary code.\n (CVE-2013-1024)\n\n - The included versions of the WebKit, libxml, and libxslt\n components in iTunes contain several errors that can\n lead to memory corruption and arbitrary code execution.\n The vendor states that one possible vector is a man-in-\n the-middle attack while the application browses the\n 'iTunes Store'.\n (CVE-2011-3102, CVE-2012-0841, CVE-2012-2807,\n CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,\n CVE-2012-5134, CVE-2013-1037, CVE-2013-1038,\n CVE-2013-1039, CVE-2013-1040, CVE-2013-1041,\n CVE-2013-1042, CVE-2013-1043, CVE-2013-1044,\n CVE-2013-1045, CVE-2013-1046, CVE-2013-1047,\n CVE-2013-2842, CVE-2013-5125, CVE-2013-5126,\n CVE-2013-5127, CVE-2013-5128)\");\n # https://web.archive.org/web/20131026094619/http://support.apple.com/kb/HT6001\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c88f1609\");\n script_set_attribute(attribute:\"see_also\", value:\"https://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple iTunes 11.1.2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-2842\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/10/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/10/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:itunes\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Peer-To-Peer File Sharing\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"itunes_sharing.nasl\");\n script_require_keys(\"iTunes/sharing\");\n script_require_ports(\"Services/www\", 3689);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:3689, embedded:TRUE, ignore_broken:TRUE);\n\nget_kb_item_or_exit(\"iTunes/\" + port + \"/enabled\");\n\ntype = get_kb_item_or_exit(\"iTunes/\" + port + \"/type\");\nsource = get_kb_item_or_exit(\"iTunes/\" + port + \"/source\");\nversion = get_kb_item_or_exit(\"iTunes/\" + port + \"/version\");\n\nif (type != 'Windows') audit(AUDIT_OS_NOT, \"Windows\");\n\nfixed_version = \"11.1.2\";\n\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Version source : ' + source +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version + '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"iTunes\", port, version);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T03:24:49", "description": "The version of Apple Safari installed on the remote Mac OS X 10.7 or\n10.8 host is earlier than 6.0.5. It is, therefore, potentially\naffected by several issues :\n\n - Multiple memory corruption vulnerabilities exist in\n WebKit that could lead to unexpected program termination\n or arbitrary code execution. (CVE-2013-0879 /\n CVE-2013-0991 / CVE-2013-0992 / CVE-2013-0993 /\n CVE-2013-0994 / CVE-2013-0995 / CVE-2013-0996 /\n CVE-2013-0997 / CVE-2013-0998 / CVE-2013-0999 /\n CVE-2013-1000 / CVE-2013-1001 / CVE-2013-1002 /\n CVE-2013-1003 / CVE-2013-1004 / CVE-2013-1005 /\n CVE-2013-1006 / CVE-2013-1007 / CVE-2013-1008 /\n CVE-2013-1009 / CVE-2013-1010 / CVE-2013-1011 /\n CVE-2013-1023)\n\n - A cross-site scripting issue exists in WebKit's handling\n of iframes. (CVE-2013-1012)\n\n - A cross-site scripting issue exists in WebKit's handling\n of copied and pasted data in HTML documents.\n (CVE-2013-0926)\n\n - In rewriting URLs to prevent cross-site scripting\n attacks, XSS Auditor could be abused, leading to\n malicious alteration of the behavior of a form\n submission. (CVE-2013-1013)", "edition": 24, "published": "2013-06-05T00:00:00", "title": "Mac OS X : Apple Safari < 6.0.5 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0992", "CVE-2013-0998", "CVE-2013-1004", "CVE-2013-1013", "CVE-2013-0879", "CVE-2013-1012", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-1023", "CVE-2013-0991", "CVE-2013-0926", "CVE-2013-0994", "CVE-2013-1011", "CVE-2013-0997", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-1006", "CVE-2013-1008", "CVE-2013-0999", "CVE-2013-1009"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:safari"], "id": "MACOSX_SAFARI6_0_5.NASL", "href": "https://www.tenable.com/plugins/nessus/66810", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(66810);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2013-0879\",\n \"CVE-2013-0926\",\n \"CVE-2013-0991\",\n \"CVE-2013-0992\",\n \"CVE-2013-0993\",\n \"CVE-2013-0994\",\n \"CVE-2013-0995\",\n \"CVE-2013-0996\",\n \"CVE-2013-0997\",\n \"CVE-2013-0998\",\n \"CVE-2013-0999\",\n \"CVE-2013-1000\",\n \"CVE-2013-1001\",\n \"CVE-2013-1002\",\n \"CVE-2013-1003\",\n \"CVE-2013-1004\",\n \"CVE-2013-1005\",\n \"CVE-2013-1006\",\n \"CVE-2013-1007\",\n \"CVE-2013-1008\",\n \"CVE-2013-1009\",\n \"CVE-2013-1010\",\n \"CVE-2013-1011\",\n \"CVE-2013-1012\",\n \"CVE-2013-1013\",\n \"CVE-2013-1023\"\n );\n script_bugtraq_id(\n 58731,\n 59326,\n 59944,\n 59953,\n 59954,\n 59955,\n 59956,\n 59957,\n 59958,\n 59959,\n 59960,\n 59963,\n 59964,\n 59965,\n 59967,\n 59970,\n 59971,\n 59972,\n 59973,\n 59974,\n 59976,\n 59977,\n 60361,\n 60362,\n 60363,\n 60364\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2013-06-04-2\");\n\n script_name(english:\"Mac OS X : Apple Safari < 6.0.5 Multiple Vulnerabilities\");\n script_summary(english:\"Check the Safari SourceVersion\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a web browser that is affected by several\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple Safari installed on the remote Mac OS X 10.7 or\n10.8 host is earlier than 6.0.5. It is, therefore, potentially\naffected by several issues :\n\n - Multiple memory corruption vulnerabilities exist in\n WebKit that could lead to unexpected program termination\n or arbitrary code execution. (CVE-2013-0879 /\n CVE-2013-0991 / CVE-2013-0992 / CVE-2013-0993 /\n CVE-2013-0994 / CVE-2013-0995 / CVE-2013-0996 /\n CVE-2013-0997 / CVE-2013-0998 / CVE-2013-0999 /\n CVE-2013-1000 / CVE-2013-1001 / CVE-2013-1002 /\n CVE-2013-1003 / CVE-2013-1004 / CVE-2013-1005 /\n CVE-2013-1006 / CVE-2013-1007 / CVE-2013-1008 /\n CVE-2013-1009 / CVE-2013-1010 / CVE-2013-1011 /\n CVE-2013-1023)\n\n - A cross-site scripting issue exists in WebKit's handling\n of iframes. (CVE-2013-1012)\n\n - A cross-site scripting issue exists in WebKit's handling\n of copied and pasted data in HTML documents.\n (CVE-2013-0926)\n\n - In rewriting URLs to prevent cross-site scripting\n attacks, XSS Auditor could be abused, leading to\n malicious alteration of the behavior of a form\n submission. (CVE-2013-1013)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-107/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-108/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-109/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT5785\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/526807/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple Safari 6.0.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-1010\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/02/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/06/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/06/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:safari\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_Safari31.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"MacOSX/Safari/Installed\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\nif (!ereg(pattern:\"Mac OS X 10\\.[78]([^0-9]|$)\", string:os)) audit(AUDIT_OS_NOT, \"Mac OS X 10.7 / 10.8\");\n\nget_kb_item_or_exit(\"MacOSX/Safari/Installed\");\npath = get_kb_item_or_exit(\"MacOSX/Safari/Path\", exit_code:1);\nversion = get_kb_item_or_exit(\"MacOSX/Safari/Version\", exit_code:1);\n\nfixed_version = \"6.0.5\";\n\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n set_kb_item(name:\"www/0/XSS\", value:TRUE);\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version + '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Safari\", version, path);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:24:50", "description": "The version of Apple Safari installed on the remote Mac OS X 10.7 or\n10.8 host is earlier than 6.1. It is, therefore, potentially affected\nby several issues :\n\n - A bounds-checking issue exists related to handling XML\n files. (CVE-2013-1036)\n\n - Multiple memory corruption vulnerabilities exist in\n WebKit that could lead to unexpected program termination\n or arbitrary code execution. (CVE-2013-1037,\n CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,\n CVE-2013-1041, CVE-2013-1042, CVE-2013-1043,\n CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,\n CVE-2013-1047, CVE-2013-2842, CVE-2013-5125,\n CVE-2013-5126, CVE-2013-5127, CVE-2013-5128)\n\n - An error exists related to URL handling that could lead\n to information disclosure. (CVE-2013-2848)\n\n - A cross-site scripting issue exists in WebKit's handling\n of URLs and drag-and-drop operations. (CVE-2013-5129,\n CVE-2013-5131)\n\n - Using 'Web Inspector' could negate 'Private Browsing'\n protections leading to information disclosure.\n (CVE-2013-5130)\n\n - An error exists related to the 'Reopen All Windows\n from Last Session' feature that could allow a local\n attacker to obtain plaintext user ID and password\n information from the 'LastSession.plist' file.\n (CVE-2013-7127)", "edition": 24, "published": "2013-10-23T00:00:00", "title": "Mac OS X : Apple Safari < 6.1 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1045", "CVE-2013-5131", "CVE-2013-1038", "CVE-2013-2842", "CVE-2013-1040", "CVE-2013-1043", "CVE-2013-1044", "CVE-2013-5126", "CVE-2013-5125", "CVE-2013-2848", "CVE-2013-7127", "CVE-2013-5128", "CVE-2013-1042", "CVE-2013-1036", "CVE-2013-1046", "CVE-2013-1041", "CVE-2013-1037", "CVE-2013-1039", "CVE-2013-5127", "CVE-2013-5129", "CVE-2013-1047", "CVE-2013-5130"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:safari"], "id": "MACOSX_SAFARI6_1.NASL", "href": "https://www.tenable.com/plugins/nessus/70563", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(70563);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2013-1036\",\n \"CVE-2013-1037\",\n \"CVE-2013-1038\",\n \"CVE-2013-1039\",\n \"CVE-2013-1040\",\n \"CVE-2013-1041\",\n \"CVE-2013-1042\",\n \"CVE-2013-1043\",\n \"CVE-2013-1044\",\n \"CVE-2013-1045\",\n \"CVE-2013-1046\",\n \"CVE-2013-1047\",\n \"CVE-2013-2842\",\n \"CVE-2013-2848\",\n \"CVE-2013-5125\",\n \"CVE-2013-5126\",\n \"CVE-2013-5127\",\n \"CVE-2013-5128\",\n \"CVE-2013-5129\",\n \"CVE-2013-5130\",\n \"CVE-2013-5131\",\n \"CVE-2013-7127\"\n );\n script_bugtraq_id(\n 60067,\n 60073,\n 62537,\n 62539,\n 62541,\n 62551,\n 62553,\n 62554,\n 62556,\n 62557,\n 62558,\n 62559,\n 62560,\n 62563,\n 62565,\n 62567,\n 62568,\n 62569,\n 62570,\n 62571,\n 63289,\n 64409\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2013-10-22-2\");\n\n script_name(english:\"Mac OS X : Apple Safari < 6.1 Multiple Vulnerabilities\");\n script_summary(english:\"Check the Safari SourceVersion\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a web browser that is affected by several\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple Safari installed on the remote Mac OS X 10.7 or\n10.8 host is earlier than 6.1. It is, therefore, potentially affected\nby several issues :\n\n - A bounds-checking issue exists related to handling XML\n files. (CVE-2013-1036)\n\n - Multiple memory corruption vulnerabilities exist in\n WebKit that could lead to unexpected program termination\n or arbitrary code execution. (CVE-2013-1037,\n CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,\n CVE-2013-1041, CVE-2013-1042, CVE-2013-1043,\n CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,\n CVE-2013-1047, CVE-2013-2842, CVE-2013-5125,\n CVE-2013-5126, CVE-2013-5127, CVE-2013-5128)\n\n - An error exists related to URL handling that could lead\n to information disclosure. (CVE-2013-2848)\n\n - A cross-site scripting issue exists in WebKit's handling\n of URLs and drag-and-drop operations. (CVE-2013-5129,\n CVE-2013-5131)\n\n - Using 'Web Inspector' could negate 'Private Browsing'\n protections leading to information disclosure.\n (CVE-2013-5130)\n\n - An error exists related to the 'Reopen All Windows\n from Last Session' feature that could allow a local\n attacker to obtain plaintext user ID and password\n information from the 'LastSession.plist' file.\n (CVE-2013-7127)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT6000\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securelist.com/en/blog/8168/Loophole_in_Safari\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple Safari 6.1 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-2842\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/10/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/10/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:safari\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_Safari31.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"MacOSX/Safari/Installed\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\nif (!ereg(pattern:\"Mac OS X 10\\.[78]([^0-9]|$)\", string:os)) audit(AUDIT_OS_NOT, \"Mac OS X 10.7 / 10.8\");\n\nget_kb_item_or_exit(\"MacOSX/Safari/Installed\");\npath = get_kb_item_or_exit(\"MacOSX/Safari/Path\", exit_code:1);\nversion = get_kb_item_or_exit(\"MacOSX/Safari/Version\", exit_code:1);\n\nfixed_version = \"6.1\";\n\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n set_kb_item(name:\"www/0/XSS\", value:TRUE);\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version + '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Safari\", version, path);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T03:17:26", "description": "The version of Apple iTunes on the remote host is prior to version\n11.0.3. It is, therefore, affected by multiple vulnerabilities :\n\n - An error exists related to certificate validation. A\n man-in-the-middle attacker can exploit this to spoof\n HTTPS servers, which allows the disclosure of sensitive\n information or the application to trust data from\n untrusted sources. Note that this issue affects the\n application regardless of the operating system.\n (CVE-2013-1014)\n\n - The version of WebKit included in iTunes contains\n several errors that can lead to memory corruption and\n arbitrary code execution. The vendor states that one\n possible vector is a man-in-the-middle attack while the\n application browses the 'iTunes Store'. Please note that\n these vulnerabilities only affect the application when\n it is running on a Windows host.\n (CVE-2012-2824, CVE-2012-2857, CVE-2012-3748,\n CVE-2012-5112, CVE-2013-0879, CVE-2013-0912,\n CVE-2013-0948, CVE-2013-0949, CVE-2013-0950,\n CVE-2013-0951, CVE-2013-0952, CVE-2013-0953,\n CVE-2013-0954, CVE-2013-0955, CVE-2013-0956,\n CVE-2013-0958, CVE-2013-0959, CVE-2013-0960,\n CVE-2013-0961, CVE-2013-0991, CVE-2013-0992,\n CVE-2013-0993, CVE-2013-0994, CVE-2013-0995,\n CVE-2013-0996, CVE-2013-0997, CVE-2013-0998,\n CVE-2013-0999, CVE-2013-1000, CVE-2013-1001,\n CVE-2013-1002, CVE-2013-1003, CVE-2013-1004,\n CVE-2013-1005, CVE-2013-1006, CVE-2013-1007,\n CVE-2013-1008, CVE-2013-1010, CVE-2013-1011)", "edition": 26, "published": "2013-05-17T00:00:00", "title": "Apple iTunes < 11.0.3 Multiple Vulnerabilities (uncredentialed check)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0951", "CVE-2012-2857", "CVE-2013-0992", "CVE-2013-0998", "CVE-2012-3748", "CVE-2013-0953", "CVE-2013-1004", "CVE-2012-2824", "CVE-2013-0959", "CVE-2013-0879", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0954", "CVE-2013-0994", "CVE-2013-0950", "CVE-2013-0961", "CVE-2013-1011", "CVE-2013-0952", "CVE-2013-0997", "CVE-2012-5112", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-0912", "CVE-2013-0956", "CVE-2013-1006", "CVE-2013-0948", "CVE-2013-1008", "CVE-2013-0958", "CVE-2013-0960", "CVE-2013-0999", "CVE-2013-0949", "CVE-2013-0955"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:itunes"], "id": "ITUNES_11_0_3_BANNER.NASL", "href": "https://www.tenable.com/plugins/nessus/66499", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(66499);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2012-2824\",\n \"CVE-2012-2857\",\n \"CVE-2012-3748\",\n \"CVE-2012-5112\",\n \"CVE-2013-0879\",\n \"CVE-2013-0912\",\n \"CVE-2013-0948\",\n \"CVE-2013-0949\",\n \"CVE-2013-0950\",\n \"CVE-2013-0951\",\n \"CVE-2013-0952\",\n \"CVE-2013-0953\",\n \"CVE-2013-0954\",\n \"CVE-2013-0955\",\n \"CVE-2013-0956\",\n \"CVE-2013-0958\",\n \"CVE-2013-0959\",\n \"CVE-2013-0960\",\n \"CVE-2013-0961\",\n \"CVE-2013-0991\",\n \"CVE-2013-0992\",\n \"CVE-2013-0993\",\n \"CVE-2013-0994\",\n \"CVE-2013-0995\",\n \"CVE-2013-0996\",\n \"CVE-2013-0997\",\n \"CVE-2013-0998\",\n \"CVE-2013-0999\",\n \"CVE-2013-1000\",\n \"CVE-2013-1001\",\n \"CVE-2013-1002\",\n \"CVE-2013-1003\",\n \"CVE-2013-1004\",\n \"CVE-2013-1005\",\n \"CVE-2013-1006\",\n \"CVE-2013-1007\",\n \"CVE-2013-1008\",\n \"CVE-2013-1010\",\n \"CVE-2013-1011\",\n \"CVE-2013-1014\"\n );\n script_bugtraq_id(\n 54203,\n 54749,\n 55867,\n 56362,\n 57576,\n 57580,\n 57581,\n 57582,\n 57584,\n 57585,\n 57586,\n 57587,\n 57588,\n 57589,\n 57590,\n 58388,\n 58495,\n 58496,\n 59941,\n 59944,\n 59953,\n 59954,\n 59955,\n 59956,\n 59957,\n 59958,\n 59959,\n 59960,\n 59963,\n 59964,\n 59965,\n 59967,\n 59970,\n 59971,\n 59972,\n 59973,\n 59974,\n 59976,\n 59977\n );\n script_xref(name:\"EDB-ID\", value:\"28081\");\n\n script_name(english:\"Apple iTunes < 11.0.3 Multiple Vulnerabilities (uncredentialed check)\");\n script_summary(english:\"Checks the version of iTunes.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a multimedia application that has multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple iTunes on the remote host is prior to version\n11.0.3. It is, therefore, affected by multiple vulnerabilities :\n\n - An error exists related to certificate validation. A\n man-in-the-middle attacker can exploit this to spoof\n HTTPS servers, which allows the disclosure of sensitive\n information or the application to trust data from\n untrusted sources. Note that this issue affects the\n application regardless of the operating system.\n (CVE-2013-1014)\n\n - The version of WebKit included in iTunes contains\n several errors that can lead to memory corruption and\n arbitrary code execution. The vendor states that one\n possible vector is a man-in-the-middle attack while the\n application browses the 'iTunes Store'. Please note that\n these vulnerabilities only affect the application when\n it is running on a Windows host.\n (CVE-2012-2824, CVE-2012-2857, CVE-2012-3748,\n CVE-2012-5112, CVE-2013-0879, CVE-2013-0912,\n CVE-2013-0948, CVE-2013-0949, CVE-2013-0950,\n CVE-2013-0951, CVE-2013-0952, CVE-2013-0953,\n CVE-2013-0954, CVE-2013-0955, CVE-2013-0956,\n CVE-2013-0958, CVE-2013-0959, CVE-2013-0960,\n CVE-2013-0961, CVE-2013-0991, CVE-2013-0992,\n CVE-2013-0993, CVE-2013-0994, CVE-2013-0995,\n CVE-2013-0996, CVE-2013-0997, CVE-2013-0998,\n CVE-2013-0999, CVE-2013-1000, CVE-2013-1001,\n CVE-2013-1002, CVE-2013-1003, CVE-2013-1004,\n CVE-2013-1005, CVE-2013-1006, CVE-2013-1007,\n CVE-2013-1008, CVE-2013-1010, CVE-2013-1011)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-107/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-108/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-109/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT5766\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2013/May/msg00000.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/526623/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple iTunes 11.0.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-5112\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/05/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/05/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/05/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:itunes\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Peer-To-Peer File Sharing\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"itunes_sharing.nasl\");\n script_require_keys(\"iTunes/sharing\");\n script_require_ports(\"Services/www\", 3689);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:3689, embedded:TRUE, ignore_broken:TRUE);\n\nget_kb_item_or_exit(\"iTunes/\" + port + \"/enabled\");\n\ntype = get_kb_item_or_exit(\"iTunes/\" + port + \"/type\");\nsource = get_kb_item_or_exit(\"iTunes/\" + port + \"/source\");\nversion = get_kb_item_or_exit(\"iTunes/\" + port + \"/version\");\n\nif (type == 'AppleTV') audit(AUDIT_LISTEN_NOT_VULN, \"iTunes on AppleTV\", port, version);\n\nfixed_version = \"11.0.3\";\n\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Version source : ' + source +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version + '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"iTunes\", port, version);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:17:24", "description": "The version of Apple iTunes installed on the remote Windows host is\nolder than 11.0.3. It therefore is potentially affected by several\nissues :\n\n - An error exists related to certificate validation\n that could allow disclosure of sensitive information\n and could allow the application to trust data from\n untrusted sources. (CVE-2013-1014)\n\n - The included version of WebKit contains several errors\n that could lead to memory corruption and possibly\n arbitrary code execution. The vendor notes one possible\n attack vector is a man-in-the-middle attack while the\n application browses the 'iTunes Store'.\n (CVE-2012-2824, CVE-2012-2857, CVE-2012-3748,\n CVE-2012-5112, CVE-2013-0879, CVE-2013-0912,\n CVE-2013-0948, CVE-2013-0949, CVE-2013-0950,\n CVE-2013-0951, CVE-2013-0952, CVE-2013-0953,\n CVE-2013-0954, CVE-2013-0955, CVE-2013-0956,\n CVE-2013-0958, CVE-2013-0959, CVE-2013-0960,\n CVE-2013-0961, CVE-2013-0991, CVE-2013-0992,\n CVE-2013-0993, CVE-2013-0994, CVE-2013-0995,\n CVE-2013-0996, CVE-2013-0997, CVE-2013-0998,\n CVE-2013-0999, CVE-2013-1000, CVE-2013-1001,\n CVE-2013-1002, CVE-2013-1003, CVE-2013-1004,\n CVE-2013-1005, CVE-2013-1006, CVE-2013-1007,\n CVE-2013-1008, CVE-2013-1010, CVE-2013-1011)", "edition": 26, "published": "2013-05-17T00:00:00", "title": "Apple iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0951", "CVE-2012-2857", "CVE-2013-0992", "CVE-2013-0998", "CVE-2012-3748", "CVE-2013-0953", "CVE-2013-1004", "CVE-2012-2824", "CVE-2013-0959", "CVE-2013-0879", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0954", "CVE-2013-0994", "CVE-2013-0950", "CVE-2013-0961", "CVE-2013-1011", "CVE-2013-0952", "CVE-2013-0997", "CVE-2012-5112", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-0912", "CVE-2013-0956", "CVE-2013-1006", "CVE-2013-0948", "CVE-2013-1008", "CVE-2013-0958", "CVE-2013-0960", "CVE-2013-0999", "CVE-2013-0949", "CVE-2013-0955"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:apple:itunes"], "id": "ITUNES_11_0_3.NASL", "href": "https://www.tenable.com/plugins/nessus/66498", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(66498);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2012-2824\",\n \"CVE-2012-2857\",\n \"CVE-2012-3748\",\n \"CVE-2012-5112\",\n \"CVE-2013-0879\",\n \"CVE-2013-0912\",\n \"CVE-2013-0948\",\n \"CVE-2013-0949\",\n \"CVE-2013-0950\",\n \"CVE-2013-0951\",\n \"CVE-2013-0952\",\n \"CVE-2013-0953\",\n \"CVE-2013-0954\",\n \"CVE-2013-0955\",\n \"CVE-2013-0956\",\n \"CVE-2013-0958\",\n \"CVE-2013-0959\",\n \"CVE-2013-0960\",\n \"CVE-2013-0961\",\n \"CVE-2013-0991\",\n \"CVE-2013-0992\",\n \"CVE-2013-0993\",\n \"CVE-2013-0994\",\n \"CVE-2013-0995\",\n \"CVE-2013-0996\",\n \"CVE-2013-0997\",\n \"CVE-2013-0998\",\n \"CVE-2013-0999\",\n \"CVE-2013-1000\",\n \"CVE-2013-1001\",\n \"CVE-2013-1002\",\n \"CVE-2013-1003\",\n \"CVE-2013-1004\",\n \"CVE-2013-1005\",\n \"CVE-2013-1006\",\n \"CVE-2013-1007\",\n \"CVE-2013-1008\",\n \"CVE-2013-1010\",\n \"CVE-2013-1011\",\n \"CVE-2013-1014\"\n );\n script_bugtraq_id(\n 54203,\n 54749,\n 55867,\n 56362,\n 57576,\n 57580,\n 57581,\n 57582,\n 57584,\n 57585,\n 57586,\n 57587,\n 57588,\n 57589,\n 57590,\n 58388,\n 58495,\n 58496,\n 59941,\n 59944,\n 59953,\n 59954,\n 59955,\n 59956,\n 59957,\n 59958,\n 59959,\n 59960,\n 59963,\n 59964,\n 59965,\n 59967,\n 59970,\n 59971,\n 59972,\n 59973,\n 59974,\n 59976,\n 59977\n );\n script_xref(name:\"EDB-ID\", value:\"28081\");\n\n script_name(english:\"Apple iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check)\");\n script_summary(english:\"Checks version of iTunes on Windows\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains an application that has multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Apple iTunes installed on the remote Windows host is\nolder than 11.0.3. It therefore is potentially affected by several\nissues :\n\n - An error exists related to certificate validation\n that could allow disclosure of sensitive information\n and could allow the application to trust data from\n untrusted sources. (CVE-2013-1014)\n\n - The included version of WebKit contains several errors\n that could lead to memory corruption and possibly\n arbitrary code execution. The vendor notes one possible\n attack vector is a man-in-the-middle attack while the\n application browses the 'iTunes Store'.\n (CVE-2012-2824, CVE-2012-2857, CVE-2012-3748,\n CVE-2012-5112, CVE-2013-0879, CVE-2013-0912,\n CVE-2013-0948, CVE-2013-0949, CVE-2013-0950,\n CVE-2013-0951, CVE-2013-0952, CVE-2013-0953,\n CVE-2013-0954, CVE-2013-0955, CVE-2013-0956,\n CVE-2013-0958, CVE-2013-0959, CVE-2013-0960,\n CVE-2013-0961, CVE-2013-0991, CVE-2013-0992,\n CVE-2013-0993, CVE-2013-0994, CVE-2013-0995,\n CVE-2013-0996, CVE-2013-0997, CVE-2013-0998,\n CVE-2013-0999, CVE-2013-1000, CVE-2013-1001,\n CVE-2013-1002, CVE-2013-1003, CVE-2013-1004,\n CVE-2013-1005, CVE-2013-1006, CVE-2013-1007,\n CVE-2013-1008, CVE-2013-1010, CVE-2013-1011)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-107/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-108/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-109/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT5766\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2013/May/msg00000.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/526623/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apple iTunes 11.0.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-5112\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/05/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/05/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/05/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apple:itunes\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"itunes_detect.nasl\");\n script_require_keys(\"SMB/iTunes/Version\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n\nversion = get_kb_item_or_exit(\"SMB/iTunes/Version\");\nfixed_version = \"11.0.3.42\";\npath = get_kb_item_or_exit(\"SMB/iTunes/Path\");\n\nif (ver_compare(ver:version, fix:fixed_version) == -1)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : '+path+\n '\\n Installed version : '+version+\n '\\n Fixed version : '+fixed_version+'\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"iTunes\", version, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T15:21:32", "description": "a. VMware vSphere client-side authentication memory corruption\n vulnerability\n\n VMware vCenter Server, vSphere Client, and ESX contain a\n vulnerability in the handling of the management authentication\n protocol. To exploit this vulnerability, an attacker must\n convince either vCenter Server, vSphere Client or ESX to\n interact with a malicious server as a client. Exploitation of\n the issue may lead to code execution on the client system.\n \n To reduce the likelihood of exploitation, vSphere components\n should be deployed on an isolated management network.\n \n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2013-1405 to this issue.\n\nb. Update to ESX/ESXi libxml2 userworld and service console\n\n The ESX/ESXi userworld libxml2 library has been updated to\n resolve multiple security issues. Also, the ESX service console\n libxml2 packages are updated to the following versions :\n\n libxml2-2.6.26-2.1.15.el5_8.5\n libxml2-python-2.6.26-2.1.15.el5_8.5\n\n These updates fix multiple security issues. The Common\n Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2011-3102 and CVE-2012-2807 to these\n issues.\n\nc. Update to ESX service console bind packages\n\n The ESX service console bind packages are updated to the\n following versions :\n\n bind-libs-9.3.6-20.P1.el5_8.2\n bind-utils-9.3.6-20.P1.el5_8.2\n\n These updates fix a security issue. The Common Vulnerabilities\n and Exposures project (cve.mitre.org) has assigned the name\n CVE-2012-4244 to this issue.\n\nd. Update to ESX service console libxslt package\n\n The ESX service console libxslt package is updated to version\n libxslt-1.1.17-4.el5_8.3 to resolve multiple security issues.\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2011-1202, CVE-2011-3970,\n CVE-2012-2825, CVE-2012-2870, and CVE-2012-2871 to these issues.", "edition": 24, "published": "2013-02-16T00:00:00", "title": "VMSA-2013-0001 : VMware vSphere security updates for the authentication service and third-party libraries", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1202", "CVE-2012-2871", "CVE-2012-2825", "CVE-2011-3970", "CVE-2012-4244", "CVE-2012-2870", "CVE-2011-3102", "CVE-2012-2807", "CVE-2013-1405"], "modified": "2013-02-16T00:00:00", "cpe": ["cpe:/o:vmware:esx:3.5", "cpe:/o:vmware:esx:4.1", "cpe:/o:vmware:esxi:3.5", "cpe:/o:vmware:esxi:5.0", "cpe:/o:vmware:esxi:5.1", "cpe:/o:vmware:esx:4.0", "cpe:/o:vmware:esxi:4.0", "cpe:/o:vmware:esxi:4.1"], "id": "VMWARE_VMSA-2013-0001.NASL", "href": "https://www.tenable.com/plugins/nessus/64642", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from VMware Security Advisory 2013-0001. \n# The text itself is copyright (C) VMware Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64642);\n script_version(\"1.33\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2011-1202\", \"CVE-2011-3102\", \"CVE-2011-3970\", \"CVE-2012-2807\", \"CVE-2012-2825\", \"CVE-2012-2870\", \"CVE-2012-2871\", \"CVE-2012-4244\", \"CVE-2013-1405\");\n script_bugtraq_id(47668, 51911, 53540, 54203, 54718, 55331, 55522, 57666);\n script_xref(name:\"VMSA\", value:\"2013-0001\");\n\n script_name(english:\"VMSA-2013-0001 : VMware vSphere security updates for the authentication service and third-party libraries\");\n script_summary(english:\"Checks esxupdate output for the patches\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote VMware ESXi / ESX host is missing one or more\nsecurity-related patches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"a. VMware vSphere client-side authentication memory corruption\n vulnerability\n\n VMware vCenter Server, vSphere Client, and ESX contain a\n vulnerability in the handling of the management authentication\n protocol. To exploit this vulnerability, an attacker must\n convince either vCenter Server, vSphere Client or ESX to\n interact with a malicious server as a client. Exploitation of\n the issue may lead to code execution on the client system.\n \n To reduce the likelihood of exploitation, vSphere components\n should be deployed on an isolated management network.\n \n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2013-1405 to this issue.\n\nb. Update to ESX/ESXi libxml2 userworld and service console\n\n The ESX/ESXi userworld libxml2 library has been updated to\n resolve multiple security issues. Also, the ESX service console\n libxml2 packages are updated to the following versions :\n\n libxml2-2.6.26-2.1.15.el5_8.5\n libxml2-python-2.6.26-2.1.15.el5_8.5\n\n These updates fix multiple security issues. The Common\n Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2011-3102 and CVE-2012-2807 to these\n issues.\n\nc. Update to ESX service console bind packages\n\n The ESX service console bind packages are updated to the\n following versions :\n\n bind-libs-9.3.6-20.P1.el5_8.2\n bind-utils-9.3.6-20.P1.el5_8.2\n\n These updates fix a security issue. The Common Vulnerabilities\n and Exposures project (cve.mitre.org) has assigned the name\n CVE-2012-4244 to this issue.\n\nd. Update to ESX service console libxslt package\n\n The ESX service console libxslt package is updated to version\n libxslt-1.1.17-4.el5_8.3 to resolve multiple security issues.\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2011-1202, CVE-2011-3970,\n CVE-2012-2825, CVE-2012-2870, and CVE-2012-2871 to these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://lists.vmware.com/pipermail/security-announce/2013/000215.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply the missing patches.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esx:3.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esx:4.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esx:4.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:3.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:4.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:4.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:5.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/02/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"VMware ESX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/VMware/release\", \"Host/VMware/version\");\n script_require_ports(\"Host/VMware/esxupdate\", \"Host/VMware/esxcli_software_vibs\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"vmware_esx_packages.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/VMware/release\")) audit(AUDIT_OS_NOT, \"VMware ESX / ESXi\");\nif (\n !get_kb_item(\"Host/VMware/esxcli_software_vibs\") &&\n !get_kb_item(\"Host/VMware/esxupdate\")\n) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ninit_esx_check(date:\"2013-01-31\");\nflag = 0;\n\n\nif (esx_check(ver:\"ESX 3.5.0\", patch:\"ESX350-201302401-SG\")) flag++;\n\nif (\n esx_check(\n ver : \"ESX 4.0\",\n patch : \"ESX400-201302401-SG\",\n patch_updates : make_list(\"ESX400-201305401-SG\", \"ESX400-201310401-SG\", \"ESX400-201404401-SG\")\n )\n) flag++;\nif (esx_check(ver:\"ESX 4.0\", patch:\"ESX400-201305402-SG\")) flag++;\n\nif (\n esx_check(\n ver : \"ESX 4.1\",\n patch : \"ESX410-201301401-SG\",\n patch_updates : make_list(\"ESX410-201304401-SG\", \"ESX410-201307401-SG\", \"ESX410-201312401-SG\", \"ESX410-201404401-SG\")\n )\n) flag++;\nif (esx_check(ver:\"ESX 4.1\", patch:\"ESX410-201301402-SG\")) flag++;\nif (esx_check(ver:\"ESX 4.1\", patch:\"ESX410-201301403-SG\")) flag++;\nif (\n esx_check(\n ver : \"ESX 4.1\",\n patch : \"ESX410-201301405-SG\",\n patch_updates : make_list(\"ESX410-201304402-SG\", \"ESX410-201307405-SG\")\n )\n) flag++;\n\nif (esx_check(ver:\"ESXi 3.5.0\", patch:\"ESXe350-201302401-I-SG\")) flag++;\nif (esx_check(ver:\"ESXi 3.5.0\", patch:\"ESXe350-201302403-C-SG\")) flag++;\n\nif (\n esx_check(\n ver : \"ESXi 4.0\",\n patch : \"ESXi400-201302401-SG\",\n patch_updates : make_list(\"ESXi400-201305401-SG\", \"ESXi400-201310401-SG\", \"ESXi400-201404401-SG\")\n )\n) flag++;\nif (\n esx_check(\n ver : \"ESXi 4.0\",\n patch : \"ESXi400-201302403-SG\",\n patch_updates : make_list(\"ESXi400-201404402-SG\")\n )\n) flag++;\n\nif (\n esx_check(\n ver : \"ESXi 4.1\",\n patch : \"ESXi410-201301401-SG\",\n patch_updates : make_list(\"ESXi410-201304401-SG\", \"ESXi410-201307401-SG\", \"ESXi410-201312401-SG\", \"ESXi410-201404401-SG\")\n )\n) flag++;\n\nif (esx_check(ver:\"ESXi 5.0\", vib:\"VMware:esx-base:5.0.0-2.29.1022489\")) flag++;\n\nif (esx_check(ver:\"ESXi 5.1\", vib:\"VMware:esx-base:5.1.0-0.11.1063671\")) flag++;\nif (esx_check(ver:\"ESXi 5.1\", vib:\"VMware:esx-xserver:5.1.0-0.11.1063671\")) flag++;\nif (esx_check(ver:\"ESXi 5.1\", vib:\"VMware:net-bnx2x:1.61.15.v50.3-1vmw.510.0.11.1063671\")) flag++;\nif (esx_check(ver:\"ESXi 5.1\", vib:\"VMware:tools-light:5.1.0-0.11.1063671\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:esx_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2017-07-02T21:11:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0992", "CVE-2013-0998", "CVE-2013-1004", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0994", "CVE-2013-1011", "CVE-2013-0997", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-1006", "CVE-2013-1008", "CVE-2013-0999"], "description": "This host is installed with Apple iTunes and is prone to\n multiple vulnerabilities.", "modified": "2017-05-11T00:00:00", "published": "2013-06-06T00:00:00", "id": "OPENVAS:803807", "href": "http://plugins.openvas.org/nasl.php?oid=803807", "type": "openvas", "title": "Apple iTunes Multiple Vulnerabilities - June13 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_apple_itunes_mult_vuln_jun13_macosx.nasl 6104 2017-05-11 09:03:48Z teissa $\n#\n# Apple iTunes Multiple Vulnerabilities - June13 (Mac OS X)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow attackers to execute arbitrary code,\n conduct Man-in-the-Middle (MitM) attack or cause heap-based buffer overflow.\n Impact Level: System/Application\";\n\ntag_summary = \"This host is installed with Apple iTunes and is prone to\n multiple vulnerabilities.\";\ntag_solution = \"Upgrade to version 11.0.3 or later,\n For updates refer to http://www.apple.com/itunes/download\";\ntag_insight = \"Multiple flaws due to\n - Improper validation of SSL certificates.\n - Integer overflow error within the 'string.replace()' method.\n - Some vulnerabilities are due to a bundled vulnerable version of WebKit.\n - Array indexing error when handling JSArray objects.\n - Boundary error within the 'string.concat()' method.\";\ntag_affected = \"Apple iTunes before 11.0.3 on Mac OS X\";\n\nif(description)\n{\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_id(803807);\n script_version(\"$Revision: 6104 $\");\n script_cve_id(\"CVE-2013-1014\", \"CVE-2013-1011\", \"CVE-2013-1010\", \"CVE-2013-1008\",\n \"CVE-2013-1007\", \"CVE-2013-1006\", \"CVE-2013-1005\", \"CVE-2013-1004\",\n \"CVE-2013-1003\", \"CVE-2013-1002\", \"CVE-2013-1001\", \"CVE-2013-1000\",\n \"CVE-2013-0999\", \"CVE-2013-0998\", \"CVE-2013-0997\", \"CVE-2013-0996\",\n \"CVE-2013-0995\", \"CVE-2013-0994\", \"CVE-2013-0993\", \"CVE-2013-0992\",\n \"CVE-2013-0991\");\n script_bugtraq_id(59941, 59974, 59976, 59977, 59970, 59973, 59972, 59971,\n 59967, 59965, 59964, 59963, 59960, 59959, 59958, 59957,\n 59956, 59955, 59954, 59953, 59944);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-11 11:03:48 +0200 (Thu, 11 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-06-06 13:03:34 +0530 (Thu, 06 Jun 2013)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_name(\"Apple iTunes Multiple Vulnerabilities - June13 (Mac OS X)\");\n\n script_xref(name : \"URL\" , value : \"http://support.apple.com/kb/HT5766\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/53471\");\n script_xref(name : \"URL\" , value : \"http://lists.apple.com/archives/security-announce/2013/May/msg00000.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_itunes_detect_macosx.nasl\");\n script_mandatory_keys(\"Apple/iTunes/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\n## Variable Initialization\nituneVer = \"\";\n\n##Get the version from kb\nituneVer= get_kb_item(\"Apple/iTunes/MacOSX/Version\");\nif(!ituneVer){\n exit(0);\n}\n\n## Check for the vulnerable version\nif(version_is_less(version:ituneVer, test_version:\"11.0.3\"))\n{\n security_message(0);\n exit(0);\n}\n\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-20T13:22:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0992", "CVE-2013-0998", "CVE-2013-1004", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0994", "CVE-2013-1011", "CVE-2013-0997", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-1006", "CVE-2013-1008", "CVE-2013-0999"], "description": "This host is installed with Apple iTunes and is prone to\n multiple vulnerabilities.", "modified": "2017-12-19T00:00:00", "published": "2013-06-06T00:00:00", "id": "OPENVAS:803806", "href": "http://plugins.openvas.org/nasl.php?oid=803806", "type": "openvas", "title": "Apple iTunes Multiple Vulnerabilities - June13 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_apple_itunes_mult_vuln_jun13_win.nasl 8169 2017-12-19 08:42:31Z cfischer $\n#\n# Apple iTunes Multiple Vulnerabilities - June13 (Windows)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:apple:itunes\";\n\ntag_impact = \"Successful exploitation will allow attackers to execute arbitrary code,\n conduct Man-in-the-Middle (MitM) attack or cause heap-based buffer overflow.\n Impact Level: System/Application\";\n\ntag_affected = \"Apple iTunes before 11.0.3 on Windows\";\ntag_insight = \"Multiple flaws due to\n - Improper validation of SSL certificates.\n - Integer overflow error within the 'string.replace()' method.\n - Some vulnerabilities are due to a bundled vulnerable version of WebKit.\n - Array indexing error when handling JSArray objects.\n - Boundary error within the 'string.concat()' method.\";\ntag_solution = \"Upgrade to version 11.0.3 or later,\n For updates refer to http://www.apple.com/itunes/download\";\ntag_summary = \"This host is installed with Apple iTunes and is prone to\n multiple vulnerabilities.\";\n\nif(description)\n{\n script_id(803806);\n script_version(\"$Revision: 8169 $\");\n script_cve_id(\"CVE-2013-1014\", \"CVE-2013-1011\", \"CVE-2013-1010\", \"CVE-2013-1008\",\n \"CVE-2013-1007\", \"CVE-2013-1006\", \"CVE-2013-1005\", \"CVE-2013-1004\",\n \"CVE-2013-1003\", \"CVE-2013-1002\", \"CVE-2013-1001\", \"CVE-2013-1000\",\n \"CVE-2013-0999\", \"CVE-2013-0998\", \"CVE-2013-0997\", \"CVE-2013-0996\",\n \"CVE-2013-0995\", \"CVE-2013-0994\", \"CVE-2013-0993\", \"CVE-2013-0992\",\n \"CVE-2013-0991\");\n script_bugtraq_id(59941, 59974, 59976, 59977, 59970, 59973, 59972, 59971,\n 59967, 59965, 59964, 59963, 59960, 59959, 59958, 59957,\n 59956, 59955, 59954, 59953, 59944);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-19 09:42:31 +0100 (Tue, 19 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-06-06 13:03:34 +0530 (Thu, 06 Jun 2013)\");\n script_name(\"Apple iTunes Multiple Vulnerabilities - June13 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://support.apple.com/kb/HT5766\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/53471\");\n script_xref(name : \"URL\" , value : \"http://lists.apple.com/archives/security-announce/2013/May/msg00000.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_apple_itunes_detection_win_900123.nasl\");\n script_mandatory_keys(\"iTunes/Win/Installed\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\ninfos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE );\nvers = infos['version'];\npath = infos['location'];\n\n## Check for the vulnerable version\nif( version_is_less( version:vers, test_version:\"11.0.3\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"11.0.3\", install_path:path );\n security_message( port:0, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-03-03T20:57:28", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0992", "CVE-2013-0998", "CVE-2013-1004", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0994", "CVE-2013-1011", "CVE-2013-0997", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-1006", "CVE-2013-1008", "CVE-2013-0999"], "description": "This host is installed with Apple iTunes and is prone to\n multiple vulnerabilities.", "modified": "2020-02-28T00:00:00", "published": "2013-06-06T00:00:00", "id": "OPENVAS:1361412562310803806", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803806", "type": "openvas", "title": "Apple iTunes Multiple Vulnerabilities - June13 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Apple iTunes Multiple Vulnerabilities - June13 (Windows)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:apple:itunes\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803806\");\n script_version(\"2020-02-28T13:41:47+0000\");\n script_cve_id(\"CVE-2013-1014\", \"CVE-2013-1011\", \"CVE-2013-1010\", \"CVE-2013-1008\",\n \"CVE-2013-1007\", \"CVE-2013-1006\", \"CVE-2013-1005\", \"CVE-2013-1004\",\n \"CVE-2013-1003\", \"CVE-2013-1002\", \"CVE-2013-1001\", \"CVE-2013-1000\",\n \"CVE-2013-0999\", \"CVE-2013-0998\", \"CVE-2013-0997\", \"CVE-2013-0996\",\n \"CVE-2013-0995\", \"CVE-2013-0994\", \"CVE-2013-0993\", \"CVE-2013-0992\",\n \"CVE-2013-0991\");\n script_bugtraq_id(59941, 59974, 59976, 59977, 59970, 59973, 59972, 59971,\n 59967, 59965, 59964, 59963, 59960, 59959, 59958, 59957,\n 59956, 59955, 59954, 59953, 59944);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-02-28 13:41:47 +0000 (Fri, 28 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2013-06-06 13:03:34 +0530 (Thu, 06 Jun 2013)\");\n script_name(\"Apple iTunes Multiple Vulnerabilities - June13 (Windows)\");\n script_xref(name:\"URL\", value:\"http://support.apple.com/kb/HT5766\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/53471\");\n script_xref(name:\"URL\", value:\"http://lists.apple.com/archives/security-announce/2013/May/msg00000.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_apple_itunes_detection_win_900123.nasl\");\n script_mandatory_keys(\"iTunes/Win/Installed\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to execute arbitrary code,\n conduct Man-in-the-Middle (MitM) attack or cause heap-based buffer overflow.\");\n\n script_tag(name:\"affected\", value:\"Apple iTunes before 11.0.3 on Windows.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws due to\n\n - Improper validation of SSL certificates.\n\n - Integer overflow error within the 'string.replace()' method.\n\n - Some vulnerabilities are due to a bundled vulnerable version of WebKit.\n\n - Array indexing error when handling JSArray objects.\n\n - Boundary error within the 'string.concat()' method.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to version 11.0.3 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Apple iTunes and is prone to\n multiple vulnerabilities.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos[\"version\"];\npath = infos[\"location\"];\n\nif( version_is_less( version:vers, test_version:\"11.0.3\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"11.0.3\", install_path:path );\n security_message( port:0, data:report );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-03T20:57:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0992", "CVE-2013-0998", "CVE-2013-1004", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0994", "CVE-2013-1011", "CVE-2013-0997", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-1006", "CVE-2013-1008", "CVE-2013-0999"], "description": "This host is installed with Apple iTunes and is prone to\n multiple vulnerabilities.", "modified": "2020-02-28T00:00:00", "published": "2013-06-06T00:00:00", "id": "OPENVAS:1361412562310803807", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803807", "type": "openvas", "title": "Apple iTunes Multiple Vulnerabilities - June13 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Apple iTunes Multiple Vulnerabilities - June13 (Mac OS X)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:apple:itunes\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803807\");\n script_version(\"2020-02-28T13:41:47+0000\");\n script_cve_id(\"CVE-2013-1014\", \"CVE-2013-1011\", \"CVE-2013-1010\", \"CVE-2013-1008\",\n \"CVE-2013-1007\", \"CVE-2013-1006\", \"CVE-2013-1005\", \"CVE-2013-1004\",\n \"CVE-2013-1003\", \"CVE-2013-1002\", \"CVE-2013-1001\", \"CVE-2013-1000\",\n \"CVE-2013-0999\", \"CVE-2013-0998\", \"CVE-2013-0997\", \"CVE-2013-0996\",\n \"CVE-2013-0995\", \"CVE-2013-0994\", \"CVE-2013-0993\", \"CVE-2013-0992\",\n \"CVE-2013-0991\");\n script_bugtraq_id(59941, 59974, 59976, 59977, 59970, 59973, 59972, 59971,\n 59967, 59965, 59964, 59963, 59960, 59959, 59958, 59957,\n 59956, 59955, 59954, 59953, 59944);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-02-28 13:41:47 +0000 (Fri, 28 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2013-06-06 13:03:34 +0530 (Thu, 06 Jun 2013)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_name(\"Apple iTunes Multiple Vulnerabilities - June13 (Mac OS X)\");\n\n script_xref(name:\"URL\", value:\"http://support.apple.com/kb/HT5766\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/53471\");\n script_xref(name:\"URL\", value:\"http://lists.apple.com/archives/security-announce/2013/May/msg00000.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_itunes_detect_macosx.nasl\");\n script_mandatory_keys(\"Apple/iTunes/MacOSX/Version\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to execute arbitrary code,\n conduct Man-in-the-Middle (MitM) attack or cause heap-based buffer overflow.\");\n\n script_tag(name:\"affected\", value:\"Apple iTunes before 11.0.3 on Mac OS X.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws due to\n\n - Improper validation of SSL certificates.\n\n - Integer overflow error within the 'string.replace()' method.\n\n - Some vulnerabilities are due to a bundled vulnerable version of WebKit.\n\n - Array indexing error when handling JSArray objects.\n\n - Boundary error within the 'string.concat()' method.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to version 11.0.3 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Apple iTunes and is prone to\n multiple vulnerabilities.\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos[\"version\"];\npath = infos[\"location\"];\n\nif(version_is_less(version:vers, test_version:\"11.0.3\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"11.0.3\", install_path:path);\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:11:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1202", "CVE-2012-2871", "CVE-2012-2825", "CVE-2011-3970", "CVE-2012-4244", "CVE-2012-2870", "CVE-2011-3102", "CVE-2012-2807", "CVE-2013-1405"], "description": "The remote ESXi is missing one or more security related Updates from VMSA-2013-0001.\n\nSummary\nVMware vSphere security updates for for the authentication service and third party libraries\n\nRelevant releases\nvCenter Server 4.1 without Update 3a\nvSphere Client 4.1 without Update 3a\nESXi 4.1 without patch ESXi410-201301401-SG\nESXi 4.0 without patches ESXi400-201302401-SG and ESXi400-201302403-SG \nESX 4.1 without patches ESX410-201301401-SG, ESX410-201301402-SG, ESX410-201301403-SG and ESX410-201301405-SG\n\nProblem Description\n\na. VMware vSphere client-side authentication memory corruption vulnerability\nVMware vCenter Server, vSphere Client, and ESX contain a vulnerability in the\nhandling of the management authentication protocol. To exploit this\nvulnerability, an attacker must convince either vCenter Server,\nvSphere Client or ESX to interact with a malicious server as a \nclient. Exploitation of the issue may lead to code execution on the client\nsystem.\n\nTo reduce the likelihood of exploitation, vSphere components should be\ndeployed on an isolated management network. \n\nb. Update to ESX/ESXi libxml2 userworld and service console\n\nThe ESX/ESXi userworld libxml2 library has been updated to resolve\nmultiple security issues. Also, the ESX service console libxml2\npackages are updated to the following versions:\n\nlibxml2-2.6.26-2.1.15.el5_8.5\nlibxml2-python-2.6.26-2.1.15.el5_8.5 \n\nc. Update to ESX service console bind packages\n\nThe ESX service console bind packages are updated to the following versions:\n\nbind-libs-9.3.6-20.P1.el5_8.2\nbind-utils-9.3.6-20.P1.el5_8.2 \n\nd. Update to ESX service console libxslt package\nThe ESX service console libxslt package is updated to version\nlibxslt-1.1.17-4.el5_8.3 to resolve multiple security issues. \n\nSolution\nApply the missing patch(es).", "modified": "2017-05-11T00:00:00", "published": "2013-02-04T00:00:00", "id": "OPENVAS:103655", "href": "http://plugins.openvas.org/nasl.php?oid=103655", "type": "openvas", "title": "VMSA-2013-0001 VMware vSphere security updates for the authentication service and third party libraries", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_VMSA-2013-0001.nasl 6104 2017-05-11 09:03:48Z teissa $\n#\n# VMSA-2013-0001 VMware vSphere security updates for the authentication service and third party libraries\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_summary = \"The remote ESXi is missing one or more security related Updates from VMSA-2013-0001.\n\nSummary\nVMware vSphere security updates for for the authentication service and third party libraries\n\nRelevant releases\nvCenter Server 4.1 without Update 3a\nvSphere Client 4.1 without Update 3a\nESXi 4.1 without patch ESXi410-201301401-SG\nESXi 4.0 without patches ESXi400-201302401-SG and ESXi400-201302403-SG \nESX 4.1 without patches ESX410-201301401-SG, ESX410-201301402-SG, ESX410-201301403-SG and ESX410-201301405-SG\n\nProblem Description\n\na. VMware vSphere client-side authentication memory corruption vulnerability\nVMware vCenter Server, vSphere Client, and ESX contain a vulnerability in the\nhandling of the management authentication protocol. To exploit this\nvulnerability, an attacker must convince either vCenter Server,\nvSphere Client or ESX to interact with a malicious server as a \nclient. Exploitation of the issue may lead to code execution on the client\nsystem.\n\nTo reduce the likelihood of exploitation, vSphere components should be\ndeployed on an isolated management network. \n\nb. Update to ESX/ESXi libxml2 userworld and service console\n\nThe ESX/ESXi userworld libxml2 library has been updated to resolve\nmultiple security issues. Also, the ESX service console libxml2\npackages are updated to the following versions:\n\nlibxml2-2.6.26-2.1.15.el5_8.5\nlibxml2-python-2.6.26-2.1.15.el5_8.5 \n\nc. Update to ESX service console bind packages\n\nThe ESX service console bind packages are updated to the following versions:\n\nbind-libs-9.3.6-20.P1.el5_8.2\nbind-utils-9.3.6-20.P1.el5_8.2 \n\nd. Update to ESX service console libxslt package\nThe ESX service console libxslt package is updated to version\nlibxslt-1.1.17-4.el5_8.3 to resolve multiple security issues. \n\nSolution\nApply the missing patch(es).\";\n\n\nif (description)\n{\n script_id(103655);\n script_cve_id(\"CVE-2013-1405\", \"CVE-2011-3102\", \"CVE-2012-2807\", \"CVE-2012-4244\", \"CVE-2011-1202\", \"CVE-2011-3970\", \"CVE-2012-2825\", \"CVE-2012-2870\", \"CVE-2012-2871\");\n\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version (\"$Revision: 6104 $\");\n script_name(\"VMSA-2013-0001 VMware vSphere security updates for the authentication service and third party libraries\");\n\n\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-11 11:03:48 +0200 (Thu, 11 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-02-04 11:02:01 +0100 (Mon, 04 Feb 2013)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"VMware Local Security Checks\");\n script_copyright(\"This script is Copyright (C) 2012 Greenbone Networks GmbH\");\n script_dependencies(\"gb_vmware_esxi_init.nasl\");\n script_mandatory_keys(\"VMware/ESXi/LSC\",\"VMware/ESX/version\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://www.vmware.com/security/advisories/VMSA-2013-0001.html\");\n exit(0);\n}\n\ninclude(\"vmware_esx.inc\");\ninclude(\"version_func.inc\");\n\nif(!get_kb_item('VMware/ESXi/LSC'))exit(0);\nif(! esxVersion = get_kb_item(\"VMware/ESX/version\"))exit(0);\n\npatches = make_array(\"4.1.0\",\"ESXi410-201301401-SG\",\n \"4.0.0\",\"ESXi400-201302403-SG\");\n\nif(!patches[esxVersion])exit(0);\n\nif(_esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {\n\n security_message(port:0);\n exit(0);\n\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-12-19T16:07:28", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1202", "CVE-2012-2871", "CVE-2012-2825", "CVE-2011-3970", "CVE-2012-4244", "CVE-2012-2870", "CVE-2011-3102", "CVE-2012-2807", "CVE-2013-1405"], "description": "The remote ESXi is missing one or more security related Updates from VMSA-2013-0001.", "modified": "2019-12-18T00:00:00", "published": "2013-02-04T00:00:00", "id": "OPENVAS:1361412562310103655", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310103655", "type": "openvas", "title": "VMware ESXi/ESX security updates for the authentication service and third party libraries (VMSA-2013-0001)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# VMSA-2013-0001 VMware vSphere security updates for the authentication service and third party libraries\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.103655\");\n script_cve_id(\"CVE-2013-1405\", \"CVE-2011-3102\", \"CVE-2012-2807\", \"CVE-2012-4244\", \"CVE-2011-1202\", \"CVE-2011-3970\", \"CVE-2012-2825\", \"CVE-2012-2870\", \"CVE-2012-2871\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"2019-12-18T11:13:08+0000\");\n script_name(\"VMware ESXi/ESX security updates for the authentication service and third party libraries (VMSA-2013-0001)\");\n script_tag(name:\"last_modification\", value:\"2019-12-18 11:13:08 +0000 (Wed, 18 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2013-02-04 11:02:01 +0100 (Mon, 04 Feb 2013)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"VMware Local Security Checks\");\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_dependencies(\"gb_vmware_esxi_init.nasl\");\n script_mandatory_keys(\"VMware/ESXi/LSC\", \"VMware/ESX/version\");\n\n script_tag(name:\"summary\", value:\"The remote ESXi is missing one or more security related Updates from VMSA-2013-0001.\");\n\n script_tag(name:\"affected\", value:\"ESXi 4.1 without patch ESXi410-201301401-SG\n\n ESXi 4.0 without patches ESXi400-201302401-SG and ESXi400-201302403-SG\n\n ESX 4.1 without patches ESX410-201301401-SG, ESX410-201301402-SG, ESX410-201301403-SG and ESX410-201301405-SG\");\n\n script_tag(name:\"insight\", value:\"a. VMware vSphere client-side authentication memory corruption vulnerability\n\n VMware vCenter Server, vSphere Client, and ESX contain a vulnerability in the\n handling of the management authentication protocol. To exploit this\n vulnerability, an attacker must convince either vCenter Server,\n vSphere Client or ESX to interact with a malicious server as a\n client. Exploitation of the issue may lead to code execution on the client\n system.\n\n To reduce the likelihood of exploitation, vSphere components should be\n deployed on an isolated management network.\n\n b. Update to ESX/ESXi libxml2 userworld and service console\n\n The ESX/ESXi userworld libxml2 library has been updated to resolve\n multiple security issues. Also, the ESX service console libxml2\n packages are updated to the following versions:\n\n libxml2-2.6.26-2.1.15.el5_8.5\n\n libxml2-python-2.6.26-2.1.15.el5_8.5\n\n c. Update to ESX service console bind packages\n\n The ESX service console bind packages are updated to the following versions:\n\n bind-libs-9.3.6-20.P1.el5_8.2\n\n bind-utils-9.3.6-20.P1.el5_8.2\n\n d. Update to ESX service console libxslt package\n\n The ESX service console libxslt package is updated to version\n libxslt-1.1.17-4.el5_8.3 to resolve multiple security issues.\");\n\n script_tag(name:\"solution\", value:\"Apply the missing patch(es).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if the target host is missing one or more patch(es).\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://www.vmware.com/security/advisories/VMSA-2013-0001.html\");\n\n exit(0);\n}\n\ninclude(\"vmware_esx.inc\");\ninclude(\"version_func.inc\");\n\nif(!get_kb_item(\"VMware/ESXi/LSC\"))\n exit(0);\n\nif(!esxVersion = get_kb_item(\"VMware/ESX/version\"))\n exit(0);\n\npatches = make_array(\"4.1.0\", \"ESXi410-201301401-SG\",\n \"4.0.0\", \"ESXi400-201302403-SG\");\n\nif(!patches[esxVersion])\n exit(99);\n\nif(report = esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:58:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1202", "CVE-2012-2871", "CVE-2012-2825", "CVE-2011-3970", "CVE-2012-2870"], "description": "Check for the Version of libxslt", "modified": "2017-12-28T00:00:00", "published": "2012-09-17T00:00:00", "id": "OPENVAS:870826", "href": "http://plugins.openvas.org/nasl.php?oid=870826", "type": "openvas", "title": "RedHat Update for libxslt RHSA-2012:1265-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for libxslt RHSA-2012:1265-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"libxslt is a library for transforming XML files into other textual formats\n (including HTML, plain text, and other XML representations of the\n underlying data) using the standard XSLT stylesheet transformation\n mechanism.\n\n A heap-based buffer overflow flaw was found in the way libxslt applied\n templates to nodes selected by certain namespaces. An attacker could use\n this flaw to create a malicious XSL file that, when used by an application\n linked against libxslt to perform an XSL transformation, could cause the\n application to crash or, possibly, execute arbitrary code with the\n privileges of the user running the application. (CVE-2012-2871)\n\n Several denial of service flaws were found in libxslt. An attacker could\n use these flaws to create a malicious XSL file that, when used by an\n application linked against libxslt to perform an XSL transformation, could\n cause the application to crash. (CVE-2012-2825, CVE-2012-2870,\n CVE-2011-3970)\n\n An information leak could occur if an application using libxslt processed\n an untrusted XPath expression, or used a malicious XSL file to perform an\n XSL transformation. If combined with other flaws, this leak could possibly\n help an attacker bypass intended memory corruption protections.\n (CVE-2011-1202)\n\n All libxslt users are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues. All running\n applications linked against libxslt must be restarted for this update to\n take effect.\";\n\ntag_affected = \"libxslt on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-September/msg00020.html\");\n script_id(870826);\n script_version(\"$Revision: 8253 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-28 07:29:51 +0100 (Thu, 28 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-17 16:40:43 +0530 (Mon, 17 Sep 2012)\");\n script_cve_id(\"CVE-2011-1202\", \"CVE-2011-3970\", \"CVE-2012-2825\",\n \"CVE-2012-2870\", \"CVE-2012-2871\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2012:1265-01\");\n script_name(\"RedHat Update for libxslt RHSA-2012:1265-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of libxslt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"libxslt\", rpm:\"libxslt~1.1.26~2.el6_3.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxslt-debuginfo\", rpm:\"libxslt-debuginfo~1.1.26~2.el6_3.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxslt-devel\", rpm:\"libxslt-devel~1.1.26~2.el6_3.1\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"libxslt\", rpm:\"libxslt~1.1.17~4.el5_8.3\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxslt-debuginfo\", rpm:\"libxslt-debuginfo~1.1.17~4.el5_8.3\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxslt-devel\", rpm:\"libxslt-devel~1.1.17~4.el5_8.3\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxslt-python\", rpm:\"libxslt-python~1.1.17~4.el5_8.3\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1202", "CVE-2012-2871", "CVE-2012-2825", "CVE-2011-3970", "CVE-2012-2870"], "description": "Oracle Linux Local Security Checks ELSA-2012-1265", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123820", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123820", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1265", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1265.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123820\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:08:59 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1265\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1265 - libxslt security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1265\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1265.html\");\n script_cve_id(\"CVE-2011-1202\", \"CVE-2011-3970\", \"CVE-2012-2825\", \"CVE-2012-2870\", \"CVE-2012-2871\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"libxslt\", rpm:\"libxslt~1.1.17~4.0.1.el5_8.3\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libxslt-devel\", rpm:\"libxslt-devel~1.1.17~4.0.1.el5_8.3\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libxslt-python\", rpm:\"libxslt-python~1.1.17~4.0.1.el5_8.3\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"libxslt\", rpm:\"libxslt~1.1.26~2.0.2.el6_3.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libxslt-devel\", rpm:\"libxslt-devel~1.1.26~2.0.2.el6_3.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libxslt-python\", rpm:\"libxslt-python~1.1.26~2.0.2.el6_3.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2020-09-02T11:45:40", "bulletinFamily": "info", "cvelist": ["CVE-2013-1014", "CVE-2013-1002", "CVE-2013-1005", "CVE-2013-1001", "CVE-2013-1000", "CVE-2013-1003", "CVE-2013-0992", "CVE-2013-0998", "CVE-2013-1004", "CVE-2013-0993", "CVE-2013-0995", "CVE-2013-1007", "CVE-2013-0991", "CVE-2013-0994", "CVE-2013-1011", "CVE-2013-0997", "CVE-2013-1010", "CVE-2013-0996", "CVE-2013-1006", "CVE-2013-1008", "CVE-2013-0999"], "description": "### *Detect date*:\n05/22/2013\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple critical vulnerabilities have been found in Apple iTunes. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or spoof HTTPS servers. Below is a complete list of vulnerabilities\n\n### *Affected products*:\nApple iTunes versions 11.0.2 and earlier\n\n### *Solution*:\nUpdate to latest version \n[iTunew](<https://www.apple.com/itunes/download/>)\n\n### *Original advisories*:\n[Apple bulletin](<http://support.apple.com/kb/HT5766>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Apple iTunes](<https://threats.kaspersky.com/en/product/Apple-iTunes/>)\n\n### *CVE-IDS*:\n[CVE-2013-0992](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0992>)6.8High \n[CVE-2013-0999](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0999>)9.3Critical \n[CVE-2013-0993](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0993>)6.8High \n[CVE-2013-1014](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1014>)4.3Warning \n[CVE-2013-1006](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1006>)9.3Critical \n[CVE-2013-0991](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0991>)6.8High \n[CVE-2013-1001](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1001>)9.3Critical \n[CVE-2013-0997](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0997>)6.8High \n[CVE-2013-1003](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1003>)9.3Critical \n[CVE-2013-1008](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1008>)9.3Critical \n[CVE-2013-0996](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0996>)6.8High \n[CVE-2013-0998](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0998>)6.8High \n[CVE-2013-0995](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0995>)6.8High \n[CVE-2013-1002](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1002>)9.3Critical \n[CVE-2013-0994](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0994>)6.8High \n[CVE-2013-1005](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1005>)9.3Critical \n[CVE-2013-1004](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1004>)9.3Critical \n[CVE-2013-1010](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1010>)9.3Critical \n[CVE-2013-1011](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1011>)6.8High \n[CVE-2013-1007](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1007>)9.3Critical \n[CVE-2013-1000](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1000>)9.3Critical", "edition": 42, "modified": "2020-05-22T00:00:00", "published": "2013-05-22T00:00:00", "id": "KLA10076", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10076", "title": "\r KLA10076Multiple vulnerabilities in Apple iTunes ", "type": "kaspersky", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2020-12-09T19:52:46", "description": "The kernel in Apple iOS before 7 does not initialize unspecified kernel data structures, which allows local users to obtain sensitive information from kernel stack memory via the (1) msgctl API or (2) segctl API.", "edition": 5, "cvss3": {}, "published": "2013-09-19T10:28:00", "title": "CVE-2013-5142", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-5142"], "modified": "2013-10-31T03:35:00", "cpe": ["cpe:/o:apple:iphone_os:1.1.0", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/o:apple:iphone_os:5.0", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/o:apple:iphone_os:3.0", "cpe:/o:apple:iphone_os:4.1", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/o:apple:iphone_os:4.0", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/o:apple:iphone_os:3.1", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/o:apple:iphone_os:5.1", "cpe:/o:apple:iphone_os:2.2", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/o:apple:iphone_os:3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1"], "id": "CVE-2013-5142", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5142", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:46", "description": "The kernel in Apple iOS before 7 allows remote attackers to cause a denial of service (assertion failure and device restart) via an invalid packet fragment.", "edition": 5, "cvss3": {}, "published": "2013-09-19T10:28:00", "title": "CVE-2013-5140", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-5140"], "modified": "2013-10-22T19:59:00", "cpe": ["cpe:/o:apple:iphone_os:1.1.0", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/o:apple:iphone_os:5.0", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/o:apple:iphone_os:3.0", "cpe:/o:apple:iphone_os:4.1", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/o:apple:iphone_os:4.0", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/o:apple:iphone_os:3.1", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/o:apple:iphone_os:5.1", "cpe:/o:apple:iphone_os:2.2", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/o:apple:iphone_os:3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1"], "id": "CVE-2013-5140", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5140", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:46", "description": "IOCatalogue in IOKitUser in Apple iOS before 7 allows attackers to cause a denial of service (NULL pointer dereference and device crash) via a crafted application.", "edition": 5, "cvss3": {}, "published": "2013-09-19T10:28:00", "title": "CVE-2013-5138", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-5138"], "modified": "2013-10-31T03:35:00", "cpe": ["cpe:/o:apple:iphone_os:1.1.0", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/o:apple:iphone_os:5.0", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/o:apple:iphone_os:3.0", "cpe:/o:apple:iphone_os:4.1", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/o:apple:iphone_os:4.0", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/o:apple:iphone_os:3.1", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/o:apple:iphone_os:5.1", "cpe:/o:apple:iphone_os:2.2", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/o:apple:iphone_os:3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1"], "id": "CVE-2013-5138", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5138", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:44", "description": "The mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted call.", "edition": 5, "cvss3": {}, "published": "2013-06-05T14:39:00", "title": "CVE-2013-3953", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-3953"], "modified": "2013-10-11T03:53:00", "cpe": ["cpe:/o:apple:iphone_os:1.1.0", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/o:apple:iphone_os:5.0", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/o:apple:iphone_os:3.0", "cpe:/o:apple:iphone_os:4.1", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:mac_os_x:10.8.4", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/o:apple:mac_os_x:10.8.2", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/o:apple:iphone_os:4.0", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/o:apple:iphone_os:3.1", "cpe:/o:apple:mac_os_x:10.8.0", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/o:apple:mac_os_x:10.8.1", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/o:apple:iphone_os:5.1", "cpe:/o:apple:iphone_os:2.2", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/o:apple:mac_os_x:10.8.3", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/o:apple:iphone_os:3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1"], "id": "CVE-2013-3953", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3953", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:46:03", "description": "Stack-based buffer overflow in the openSharedCacheFile function in dyld.cpp in dyld in Apple iOS 5.1.x and 6.x through 6.1.3 makes it easier for attackers to conduct untethering attacks via a long string in the DYLD_SHARED_CACHE_DIR environment variable.", "edition": 3, "cvss3": {}, "published": "2013-06-05T14:39:00", "title": "CVE-2013-3950", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-3950"], "modified": "2013-10-31T03:34:00", "cpe": ["cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:5.1"], "id": "CVE-2013-3950", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3950", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:46", "description": "WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.", "edition": 5, "cvss3": {}, "published": "2013-09-19T10:27:00", "title": "CVE-2013-5128", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-5128"], "modified": "2014-01-28T04:55:00", "cpe": ["cpe:/o:apple:iphone_os:1.1.0", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/o:apple:iphone_os:5.0", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/o:apple:iphone_os:3.0", "cpe:/o:apple:iphone_os:4.1", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/o:apple:iphone_os:4.0", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/o:apple:iphone_os:3.1", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/o:apple:iphone_os:5.1", "cpe:/o:apple:iphone_os:2.2", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/o:apple:iphone_os:3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1"], "id": "CVE-2013-5128", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5128", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:46", "description": "WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.", "edition": 5, "cvss3": {}, "published": "2013-09-19T10:27:00", "title": "CVE-2013-5126", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-5126"], "modified": "2014-01-28T04:55:00", "cpe": ["cpe:/o:apple:iphone_os:1.1.0", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/o:apple:iphone_os:5.0", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/o:apple:iphone_os:3.0", "cpe:/o:apple:iphone_os:4.1", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/o:apple:iphone_os:4.0", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/o:apple:iphone_os:3.1", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/o:apple:iphone_os:5.1", "cpe:/o:apple:iphone_os:2.2", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/o:apple:iphone_os:3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1"], "id": "CVE-2013-5126", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5126", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:47:24", "description": "Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.", "edition": 5, "cvss3": {}, "published": "2012-11-28T01:55:00", "title": "CVE-2012-5134", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5134"], "modified": "2017-08-29T01:32:00", "cpe": ["cpe:/a:google:chrome:23.0.1271.23", "cpe:/a:xmlsoft:libxml2:2.7.4", "cpe:/a:google:chrome:23.0.1271.61", "cpe:/a:google:chrome:23.0.1271.0", "cpe:/a:xmlsoft:libxml2:2.1.1", "cpe:/a:xmlsoft:libxml2:2.4.13", "cpe:/a:xmlsoft:libxml2:2.6.27", "cpe:/a:xmlsoft:libxml2:2.5.10", "cpe:/a:xmlsoft:libxml2:2.3.7", "cpe:/o:apple:iphone_os:1.1.0", "cpe:/a:google:chrome:23.0.1271.44", "cpe:/a:xmlsoft:libxml2:2.4.15", "cpe:/a:xmlsoft:libxml2:2.0.0", "cpe:/a:google:chrome:23.0.1271.64", "cpe:/a:xmlsoft:libxml2:2.4.28", "cpe:/a:xmlsoft:libxml2:2.6.17", "cpe:/a:google:chrome:23.0.1271.37", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/a:google:chrome:23.0.1271.24", "cpe:/a:xmlsoft:libxml2:1.8.4", "cpe:/a:xmlsoft:libxml2:2.4.18", "cpe:/a:xmlsoft:libxml2:2.4.1", "cpe:/a:google:chrome:23.0.1271.3", "cpe:/a:xmlsoft:libxml2:1.8.5", "cpe:/a:xmlsoft:libxml2:2.7.0", "cpe:/a:xmlsoft:libxml2:2.3.5", "cpe:/a:xmlsoft:libxml2:2.6.7", "cpe:/o:apple:iphone_os:5.0", "cpe:/a:xmlsoft:libxml2:2.6.2", "cpe:/a:google:chrome:23.0.1271.54", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/a:xmlsoft:libxml2:2.3.4", "cpe:/o:apple:iphone_os:3.0", "cpe:/a:xmlsoft:libxml2:1.8.1", "cpe:/a:xmlsoft:libxml2:2.4.5", "cpe:/a:xmlsoft:libxml2:2.2.6", "cpe:/o:apple:iphone_os:4.1", "cpe:/a:xmlsoft:libxml2:1.8.0", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/a:google:chrome:23.0.1271.39", "cpe:/a:google:chrome:23.0.1271.41", "cpe:/a:xmlsoft:libxml2:2.5.4", "cpe:/a:xmlsoft:libxml2:2.5.7", "cpe:/a:xmlsoft:libxml2:2.3.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/a:google:chrome:23.0.1271.19", "cpe:/a:google:chrome:23.0.1271.51", "cpe:/a:xmlsoft:libxml2:2.4.10", "cpe:/a:google:chrome:23.0.1271.16", "cpe:/a:xmlsoft:libxml2:2.4.12", "cpe:/a:xmlsoft:libxml2:2.6.20", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/a:google:chrome:23.0.1271.32", "cpe:/a:google:chrome:23.0.1271.84", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/a:xmlsoft:libxml2:2.6.11", "cpe:/a:google:chrome:23.0.1271.60", "cpe:/a:google:chrome:23.0.1271.31", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/a:xmlsoft:libxml2:2.3.12", "cpe:/a:google:chrome:23.0.1271.18", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/a:xmlsoft:libxml2:2.7.5", "cpe:/a:google:chrome:23.0.1271.56", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/a:xmlsoft:libxml2:2.6.32", "cpe:/a:xmlsoft:libxml2:2.4.24", "cpe:/a:xmlsoft:libxml2:1.7.0", "cpe:/a:xmlsoft:libxml2:2.5.11", "cpe:/a:google:chrome:23.0.1271.57", "cpe:/a:google:chrome:23.0.1271.14", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/a:xmlsoft:libxml2:2.2.0", "cpe:/a:google:chrome:23.0.1271.2", "cpe:/a:google:chrome:23.0.1271.21", "cpe:/a:google:chrome:23.0.1271.10", "cpe:/a:xmlsoft:libxml2:2.2.4", "cpe:/a:google:chrome:23.0.1271.20", "cpe:/a:xmlsoft:libxml2:2.4.26", "cpe:/a:xmlsoft:libxml2:2.6.14", "cpe:/a:xmlsoft:libxml2:2.7.7", "cpe:/a:xmlsoft:libxml2:2.2.5", "cpe:/a:xmlsoft:libxml2:2.3.0", "cpe:/a:xmlsoft:libxml2:2.6.3", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/a:xmlsoft:libxml2:2.4.16", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/a:google:chrome:23.0.1271.1", "cpe:/a:xmlsoft:libxml2:2.3.10", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/a:xmlsoft:libxml2:1.7.4", "cpe:/a:xmlsoft:libxml2:2.6.18", "cpe:/a:xmlsoft:libxml2:1.8.16", "cpe:/a:google:chrome:23.0.1271.22", "cpe:/a:xmlsoft:libxml2:2.3.6", "cpe:/a:google:chrome:23.0.1271.53", "cpe:/a:xmlsoft:libxml2:2.4.30", "cpe:/a:xmlsoft:libxml2:2.6.30", "cpe:/a:google:chrome:23.0.1271.17", "cpe:/a:google:chrome:23.0.1271.36", "cpe:/a:google:chrome:23.0.1271.86", "cpe:/a:xmlsoft:libxml2:2.6.13", "cpe:/a:google:chrome:23.0.1271.46", "cpe:/a:xmlsoft:libxml2:2.4.8", "cpe:/a:xmlsoft:libxml2:2.4.29", "cpe:/a:google:chrome:23.0.1271.85", "cpe:/a:google:chrome:23.0.1271.55", "cpe:/a:google:chrome:23.0.1271.45", "cpe:/a:xmlsoft:libxml2:2.2.8", "cpe:/a:google:chrome:23.0.1271.4", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/a:google:chrome:23.0.1271.40", "cpe:/a:xmlsoft:libxml2:1.7.2", "cpe:/a:xmlsoft:libxml2:2.4.11", "cpe:/o:apple:iphone_os:4.0", "cpe:/a:google:chrome:23.0.1271.15", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/a:google:chrome:23.0.1271.58", "cpe:/a:xmlsoft:libxml2:1.8.9", "cpe:/a:xmlsoft:libxml2:2.3.8", "cpe:/a:google:chrome:23.0.1271.49", "cpe:/a:xmlsoft:libxml2:2.6.1", "cpe:/a:xmlsoft:libxml2:1.8.2", "cpe:/a:xmlsoft:libxml2:2.6.22", "cpe:/a:xmlsoft:libxml2:2.6.12", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/a:xmlsoft:libxml2:2.6.26", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/a:google:chrome:23.0.1271.35", "cpe:/a:xmlsoft:libxml2:2.4.3", "cpe:/a:google:chrome:23.0.1271.83", "cpe:/a:xmlsoft:libxml2:2.2.2", "cpe:/a:xmlsoft:libxml2:2.4.27", "cpe:/o:apple:iphone_os:3.1", "cpe:/a:xmlsoft:libxml2:2.6.8", "cpe:/a:xmlsoft:libxml2:2.4.2", "cpe:/a:xmlsoft:libxml2:2.7.3", "cpe:/a:xmlsoft:libxml2:2.3.14", "cpe:/a:google:chrome:23.0.1271.52", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/a:xmlsoft:libxml2:2.3.11", "cpe:/a:google:chrome:23.0.1271.87", "cpe:/a:xmlsoft:libxml2:2.4.6", "cpe:/a:xmlsoft:libxml2:2.4.22", "cpe:/a:xmlsoft:libxml2:2.6.9", "cpe:/a:google:chrome:23.0.1271.26", "cpe:/a:xmlsoft:libxml2:1.8.7", "cpe:/a:xmlsoft:libxml2:2.4.9", "cpe:/a:xmlsoft:libxml2:2.4.23", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/a:xmlsoft:libxml2:2.5.0", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/a:xmlsoft:libxml2:2.4.25", "cpe:/a:xmlsoft:libxml2:2.2.7", "cpe:/a:google:chrome:23.0.1271.6", "cpe:/a:xmlsoft:libxml2:2.5.8", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/a:xmlsoft:libxml2:1.8.13", "cpe:/o:apple:iphone_os:5.1", "cpe:/a:xmlsoft:libxml2:1.7.1", "cpe:/a:google:chrome:23.0.1271.7", "cpe:/a:xmlsoft:libxml2:2.7.2", "cpe:/a:google:chrome:23.0.1271.13", "cpe:/a:xmlsoft:libxml2:2.3.3", "cpe:/o:apple:iphone_os:2.2", "cpe:/a:google:chrome:23.0.1271.88", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/a:xmlsoft:libxml2:2.4.19", "cpe:/a:google:chrome:23.0.1271.33", "cpe:/a:google:chrome:23.0.1271.30", "cpe:/a:google:chrome:23.0.1271.8", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/a:xmlsoft:libxml2:2.4.4", "cpe:/a:xmlsoft:libxml2:1.7.3", "cpe:/a:xmlsoft:libxml2:2.4.14", "cpe:/a:xmlsoft:libxml2:2.3.9", "cpe:/a:xmlsoft:libxml2:2.6.6", "cpe:/a:xmlsoft:libxml2:2.6.16", "cpe:/a:xmlsoft:libxml2:2.6.5", "cpe:/a:xmlsoft:libxml2:2.4.7", "cpe:/a:google:chrome:23.0.1271.11", "cpe:/a:google:chrome:23.0.1271.50", "cpe:/a:google:chrome:23.0.1271.5", "cpe:/a:xmlsoft:libxml2:2.2.10", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/a:google:chrome:23.0.1271.12", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/a:xmlsoft:libxml2:1.8.14", "cpe:/a:xmlsoft:libxml2:2.7.6", "cpe:/a:xmlsoft:libxml2:2.6.4", "cpe:/a:xmlsoft:libxml2:2.4.17", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/a:xmlsoft:libxml2:2.2.3", "cpe:/a:xmlsoft:libxml2:2.2.11", "cpe:/o:apple:iphone_os:3.2", "cpe:/a:xmlsoft:libxml2:2.1.0", "cpe:/a:xmlsoft:libxml2:2.3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/a:google:chrome:23.0.1271.62", "cpe:/a:xmlsoft:libxml2:1.8.6", "cpe:/a:xmlsoft:libxml2:2.4.21", "cpe:/a:xmlsoft:libxml2:2.9.0", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/a:google:chrome:23.0.1271.38", "cpe:/a:xmlsoft:libxml2:1.8.3", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1", "cpe:/a:xmlsoft:libxml2:2.4.20", "cpe:/a:xmlsoft:libxml2:2.3.13", "cpe:/a:xmlsoft:libxml2:2.2.9", "cpe:/a:xmlsoft:libxml2:2.7.1", "cpe:/a:xmlsoft:libxml2:2.2.1", "cpe:/a:google:chrome:23.0.1271.89", "cpe:/a:xmlsoft:libxml2:1.8.10", "cpe:/a:xmlsoft:libxml2:2.6.0"], "id": "CVE-2012-5134", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5134", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:46", "description": "kextd in Kext Management in Apple iOS before 7 does not properly verify authorization for IPC messages, which allows local users to (1) load or (2) unload kernel extensions via a crafted message.", "edition": 5, "cvss3": {}, "published": "2013-09-19T10:28:00", "title": "CVE-2013-5145", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.3, "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 9.2, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-5145"], "modified": "2013-10-31T03:35:00", "cpe": ["cpe:/o:apple:iphone_os:1.1.0", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/o:apple:iphone_os:5.0", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/o:apple:iphone_os:3.0", "cpe:/o:apple:iphone_os:4.1", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/o:apple:iphone_os:4.0", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/o:apple:iphone_os:3.1", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/o:apple:iphone_os:5.1", "cpe:/o:apple:iphone_os:2.2", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/o:apple:iphone_os:3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1"], "id": "CVE-2013-5145", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5145", "cvss": {"score": 6.3, "vector": "AV:L/AC:M/Au:N/C:N/I:C/A:C"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:46", "description": "WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.", "edition": 5, "cvss3": {}, "published": "2013-09-19T10:27:00", "title": "CVE-2013-5125", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-5125"], "modified": "2014-01-28T04:55:00", "cpe": ["cpe:/o:apple:iphone_os:1.1.0", "cpe:/o:apple:iphone_os:4.2.1", "cpe:/o:apple:iphone_os:5.0", "cpe:/o:apple:iphone_os:2.0.0", "cpe:/o:apple:iphone_os:3.0", "cpe:/o:apple:iphone_os:4.1", "cpe:/o:apple:iphone_os:2.2.1", "cpe:/o:apple:iphone_os:6.0", "cpe:/o:apple:iphone_os:2.0.1", "cpe:/o:apple:iphone_os:6.1.3", "cpe:/o:apple:iphone_os:4.3.0", "cpe:/o:apple:iphone_os:4.2.5", "cpe:/o:apple:iphone_os:3.0.1", "cpe:/o:apple:iphone_os:5.1.1", "cpe:/o:apple:iphone_os:6.0.1", "cpe:/o:apple:iphone_os:4.3.2", "cpe:/o:apple:iphone_os:6.1.4", "cpe:/o:apple:iphone_os:6.1.2", "cpe:/o:apple:iphone_os:4.0.2", "cpe:/o:apple:iphone_os:3.1.3", "cpe:/o:apple:iphone_os:4.0.1", "cpe:/o:apple:iphone_os:6.1", "cpe:/o:apple:iphone_os:2.1", "cpe:/o:apple:iphone_os:4.0", "cpe:/o:apple:iphone_os:2.0", "cpe:/o:apple:iphone_os:1.1.2", "cpe:/o:apple:iphone_os:6.0.2", "cpe:/o:apple:iphone_os:1.1.4", "cpe:/o:apple:iphone_os:3.1", "cpe:/o:apple:iphone_os:4.2.8", "cpe:/o:apple:iphone_os:4.3.3", "cpe:/o:apple:iphone_os:5.0.1", "cpe:/o:apple:iphone_os:1.1.1", "cpe:/o:apple:iphone_os:5.1", "cpe:/o:apple:iphone_os:2.2", "cpe:/o:apple:iphone_os:3.2.1", "cpe:/o:apple:iphone_os:2.0.2", "cpe:/o:apple:iphone_os:1.1.3", "cpe:/o:apple:iphone_os:1.0.2", "cpe:/o:apple:iphone_os:2.1.1", "cpe:/o:apple:iphone_os:3.2.2", "cpe:/o:apple:iphone_os:3.2", "cpe:/o:apple:iphone_os:3.1.2", "cpe:/o:apple:iphone_os:1.1.5", "cpe:/o:apple:iphone_os:1.0.0", "cpe:/o:apple:iphone_os:1.0.1", "cpe:/o:apple:iphone_os:4.3.5", "cpe:/o:apple:iphone_os:4.3.1"], "id": "CVE-2013-5125", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5125", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"]}], "vmware": [{"lastseen": "2019-11-06T16:05:37", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1202", "CVE-2012-2871", "CVE-2012-2825", "CVE-2011-3970", "CVE-2012-4244", "CVE-2012-2870", "CVE-2011-3102", "CVE-2012-2807", "CVE-2013-1405"], "description": "a. VMware vSphere client-side authentication memory corruption vulnerability \n \nVMware vCenter Server, vSphere Client, and ESX contain a vulnerability in the handling of the management authentication protocol. To exploit this vulnerability, an attacker must convince either vCenter Server, vSphere Client or ESX to interact with a malicious server as a client. Exploitation of the issue may lead to code execution on the client system. \nTo reduce the likelihood of exploitation, vSphere components should be deployed on an isolated management network. \n \nThe Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2013-1405 to this issue. \nColumn 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. \n\n", "edition": 4, "modified": "2013-05-30T00:00:00", "published": "2013-01-31T00:00:00", "id": "VMSA-2013-0001", "href": "https://www.vmware.com/security/advisories/VMSA-2013-0001.html", "title": "VMware vSphere security updates for the authentication service and third party libraries", "type": "vmware", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "seebug": [{"lastseen": "2017-11-19T17:39:50", "description": "BUGTRAQ ID: 62369\r\nCVE(CAN) ID: CVE-2013-1026\r\n\r\nApple Mac OS X\u662f\u82f9\u679c\u7535\u8111\u64cd\u4f5c\u7cfb\u7edf\u8f6f\u4ef6\u3002\r\n\r\nMac OS X 10.8 - 10.8.4\u5728\u5904\u7406PDF\u6587\u4ef6\u5185JPEG2000\u7f16\u7801\u7684\u6570\u636e\u65f6\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u7279\u5236\u7684PDF\u6587\u4ef6\uff0c\u5229\u7528\u6b64\u6f0f\u6d1e\u53ef\u9020\u6210\u5e94\u7528\u7ec8\u6b62\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\r\n0\r\nApple Mac OS X 10.8 - 10.8.4\r\nApple Mac OS X\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nApple\r\n-----\r\nApple\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08HT5880\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nHT5880\uff1aAbout the security content of OS X Mountain Lion v10.8.5 and Security Update 2013-004\r\n\u94fe\u63a5\uff1ahttp://support.apple.com/kb/HT5880\r\n\r\n\u8865\u4e01\u4e0b\u8f7d\uff1ahttp://www.apple.com/support/downloads/", "published": "2013-09-16T00:00:00", "type": "seebug", "title": "Apple MAC OS X ImageIO \u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e(CVE-2013-1026)", "bulletinFamily": "exploit", "cvelist": ["CVE-2013-1026"], "modified": "2013-09-16T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-61017", "id": "SSV:61017", "sourceData": "", "sourceHref": "", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "amazon": [{"lastseen": "2020-11-10T12:35:10", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1202", "CVE-2012-2871", "CVE-2012-2825", "CVE-2011-3970", "CVE-2012-2870"], "description": "**Issue Overview:**\n\nA heap-based buffer overflow flaw was found in the way libxslt applied templates to nodes selected by certain namespaces. An attacker could use this flaw to create a malicious XSL file that, when used by an application linked against libxslt to perform an XSL transformation, could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. ([CVE-2012-2871 __](<https://access.redhat.com/security/cve/CVE-2012-2871>))\n\nSeveral denial of service flaws were found in libxslt. An attacker could use these flaws to create a malicious XSL file that, when used by an application linked against libxslt to perform an XSL transformation, could cause the application to crash. ([CVE-2012-2825 __](<https://access.redhat.com/security/cve/CVE-2012-2825>), [CVE-2012-2870 __](<https://access.redhat.com/security/cve/CVE-2012-2870>), [CVE-2011-3970 __](<https://access.redhat.com/security/cve/CVE-2011-3970>))\n\nAn information leak could occur if an application using libxslt processed an untrusted XPath expression, or used a malicious XSL file to perform an XSL transformation. If combined with other flaws, this leak could possibly help an attacker bypass intended memory corruption protections. ([CVE-2011-1202 __](<https://access.redhat.com/security/cve/CVE-2011-1202>))\n\n \n**Affected Packages:** \n\n\nlibxslt\n\n \n**Issue Correction:** \nRun _yum update libxslt_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n libxslt-python-1.1.26-2.7.amzn1.i686 \n libxslt-1.1.26-2.7.amzn1.i686 \n libxslt-devel-1.1.26-2.7.amzn1.i686 \n libxslt-debuginfo-1.1.26-2.7.amzn1.i686 \n \n src: \n libxslt-1.1.26-2.7.amzn1.src \n \n x86_64: \n libxslt-devel-1.1.26-2.7.amzn1.x86_64 \n libxslt-debuginfo-1.1.26-2.7.amzn1.x86_64 \n libxslt-python-1.1.26-2.7.amzn1.x86_64 \n libxslt-1.1.26-2.7.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2012-09-22T21:33:00", "published": "2012-09-22T21:33:00", "id": "ALAS-2012-123", "href": "https://alas.aws.amazon.com/ALAS-2012-123.html", "title": "Important: libxslt", "type": "amazon", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:41", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1202", "CVE-2012-2871", "CVE-2012-2825", "CVE-2011-3970", "CVE-2012-2870"], "description": "[1.1.26-2.0.2.el6_3.1]\n- Increment release to avoid ULN conflict with previous release.\n[1.1.26-2.0.1.el6_3.1]\n- Added libxslt-oracle-enterprise.patch and replaced doc/redhat.gif in tarball\n[1.1.26-2.el6_3.1]\n- fixes CVE-2011-1202 CVE-2011-3970 CVE-2012-2825 CVE-2012-2871 CVE-2012-2870\n- Fix direct pattern matching bug\n- Fix popping of vars in xsltCompilerNodePop\n- Fix bug 602515\n- Fix generate-id() to not expose object addresses (CVE-2011-1202)\n- Fix some case of pattern parsing errors (CVE-2011-3970)\n- Fix a bug in selecting XSLT elements (CVE-2012-2825)\n- Fix portability to upcoming libxml2-2.9.0\n- Fix default template processing on namespace nodes (CVE-2012-2871)\n- Cleanup of the pattern compilation code (CVE-2012-2870)\n- Hardening of code checking node types in various entry point (CVE-2012-2870)\n- Hardening of code checking node types in EXSLT (CVE-2012-2870)\n- Fix system-property with unknown namespace\n- Xsltproc should return an error code if xinclude fails\n- Fix a dictionary string usage\n- Avoid a heap use after free error", "edition": 4, "modified": "2012-09-13T00:00:00", "published": "2012-09-13T00:00:00", "id": "ELSA-2012-1265", "href": "http://linux.oracle.com/errata/ELSA-2012-1265.html", "title": "libxslt security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1202", "CVE-2011-3970", "CVE-2012-2825", "CVE-2012-2870", "CVE-2012-2871"], "description": "This C library allows to transform XML files into other XML files (or HTML, text, ...) using the standard XSLT stylesheet transformation mechanism. To use it you need to have a version of libxml2 >=3D 2.6.27 installed. The xsltproc command is a command line interface to the XSLT eng ine ", "modified": "2012-09-26T09:11:57", "published": "2012-09-26T09:11:57", "id": "FEDORA:6829022A44", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 17 Update: libxslt-1.1.26-10.fc17", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1202", "CVE-2011-3970", "CVE-2012-2825", "CVE-2012-2870", "CVE-2012-2871"], "description": "This C library allows to transform XML files into other XML files (or HTML, text, ...) using the standard XSLT stylesheet transformation mechanism. To use it you need to have a version of libxml2 >=3D 2.6.27 installed. The xsltproc command is a command line interface to the XSLT eng ine ", "modified": "2012-12-09T06:31:24", "published": "2012-12-09T06:31:24", "id": "FEDORA:C70C120226", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: libxslt-1.1.27-2.fc18", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}