Vulnerabilites related to webkit - webkit
CVE-2010-1766 (GCVE-0-2010-1766)
Vulnerability from cvelistv5
Published
2010-07-22 01:00
Modified
2024-08-07 01:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Off-by-one error in the WebSocketHandshake::readServerHandshake function in websockets/WebSocketHandshake.cpp in WebCore in WebKit before r56380, as used in Qt and other products, allows remote websockets servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an upgrade header that is long and invalid.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2011:039", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039" }, { "name": "ADV-2010-2722", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2722" }, { "name": "FEDORA-2010-11020", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html" }, { "name": "43068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43068" }, { "name": "ADV-2010-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1801" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596494" }, { "name": "USN-1006-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1006-1" }, { "name": "41856", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41856" }, { "name": "ADV-2011-0212", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=36339" }, { "name": "40557", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40557" }, { "name": "SUSE-SR:2011:002", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "name": "FEDORA-2010-11011", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html" }, { "name": "ADV-2011-0552", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0552" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://trac.webkit.org/changeset/56380" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Off-by-one error in the WebSocketHandshake::readServerHandshake function in websockets/WebSocketHandshake.cpp in WebCore in WebKit before r56380, as used in Qt and other products, allows remote websockets servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an upgrade header that is long and invalid." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-11-03T09:00:00", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "MDVSA-2011:039", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039" }, { "name": "ADV-2010-2722", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2722" }, { "name": "FEDORA-2010-11020", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html" }, { "name": "43068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43068" }, { "name": "ADV-2010-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1801" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596494" }, { "name": "USN-1006-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1006-1" }, { "name": "41856", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41856" }, { "name": "ADV-2011-0212", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=36339" }, { "name": "40557", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40557" }, { "name": "SUSE-SR:2011:002", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "name": "FEDORA-2010-11011", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html" }, { "name": "ADV-2011-0552", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0552" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://trac.webkit.org/changeset/56380" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2010-1766", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Off-by-one error in the WebSocketHandshake::readServerHandshake function in websockets/WebSocketHandshake.cpp in WebCore in WebKit before r56380, as used in Qt and other products, allows remote websockets servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an upgrade header that is long and invalid." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2011:039", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039" }, { "name": "ADV-2010-2722", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2722" }, { "name": "FEDORA-2010-11020", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html" }, { "name": "43068", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43068" }, { "name": "ADV-2010-1801", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1801" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=596494", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596494" }, { "name": "USN-1006-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1006-1" }, { "name": "41856", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41856" }, { "name": "ADV-2011-0212", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "name": "https://bugs.webkit.org/show_bug.cgi?id=36339", "refsource": "CONFIRM", "url": "https://bugs.webkit.org/show_bug.cgi?id=36339" }, { "name": "40557", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40557" }, { "name": "SUSE-SR:2011:002", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "name": "FEDORA-2010-11011", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html" }, { "name": "ADV-2011-0552", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0552" }, { "name": "http://trac.webkit.org/changeset/56380", "refsource": "CONFIRM", "url": "http://trac.webkit.org/changeset/56380" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2010-1766", "datePublished": "2010-07-22T01:00:00", "dateReserved": "2010-05-06T00:00:00", "dateUpdated": "2024-08-07T01:35:53.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3933 (GCVE-0-2009-3933)
Vulnerability from cvelistv5
Published
2009-11-12 16:00
Modified
2024-08-07 06:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WebKit before r50173, as used in Google Chrome before 3.0.195.32, allows remote attackers to cause a denial of service (CPU consumption) via a web page that calls the JavaScript setInterval method, which triggers an incompatibility between the WTF::currentTime and base::Time functions.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.882Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43068" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html" }, { "name": "ADV-2011-0212", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://trac.webkit.org/changeset/50173" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=30833" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://codereview.chromium.org/339039" }, { "name": "googlechrome-webkit-dos(54297)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54297" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/chromium/issues/detail?id=25892" }, { "name": "SUSE-SR:2011:002", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://src.chromium.org/viewvc/chrome?view=rev\u0026revision=30311" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311\u0026r2=30310" }, { "name": "59745", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/59745" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "WebKit before r50173, as used in Google Chrome before 3.0.195.32, allows remote attackers to cause a denial of service (CPU consumption) via a web page that calls the JavaScript setInterval method, which triggers an incompatibility between the WTF::currentTime and base::Time functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "43068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43068" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html" }, { "name": "ADV-2011-0212", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://trac.webkit.org/changeset/50173" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=30833" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://codereview.chromium.org/339039" }, { "name": "googlechrome-webkit-dos(54297)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54297" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/chromium/issues/detail?id=25892" }, { "name": "SUSE-SR:2011:002", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://src.chromium.org/viewvc/chrome?view=rev\u0026revision=30311" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311\u0026r2=30310" }, { "name": "59745", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/59745" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3933", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WebKit before r50173, as used in Google Chrome before 3.0.195.32, allows remote attackers to cause a denial of service (CPU consumption) via a web page that calls the JavaScript setInterval method, which triggers an incompatibility between the WTF::currentTime and base::Time functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43068", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43068" }, { "name": "http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html" }, { "name": "ADV-2011-0212", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "name": "http://trac.webkit.org/changeset/50173", "refsource": "CONFIRM", "url": "http://trac.webkit.org/changeset/50173" }, { "name": "https://bugs.webkit.org/show_bug.cgi?id=30833", "refsource": "CONFIRM", "url": "https://bugs.webkit.org/show_bug.cgi?id=30833" }, { "name": "http://codereview.chromium.org/339039", "refsource": "CONFIRM", "url": "http://codereview.chromium.org/339039" }, { "name": "googlechrome-webkit-dos(54297)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54297" }, { "name": "http://code.google.com/p/chromium/issues/detail?id=25892", "refsource": "CONFIRM", "url": "http://code.google.com/p/chromium/issues/detail?id=25892" }, { "name": "SUSE-SR:2011:002", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "name": "http://src.chromium.org/viewvc/chrome?view=rev\u0026revision=30311", "refsource": "CONFIRM", "url": "http://src.chromium.org/viewvc/chrome?view=rev\u0026revision=30311" }, { "name": "http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311\u0026r2=30310", "refsource": "CONFIRM", "url": "http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311\u0026r2=30310" }, { "name": "59745", "refsource": "OSVDB", "url": "http://www.osvdb.org/59745" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3933", "datePublished": "2009-11-12T16:00:00", "dateReserved": "2009-11-12T00:00:00", "dateUpdated": "2024-08-07T06:45:50.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6059 (GCVE-0-2008-6059)
Vulnerability from cvelistv5
Published
2009-02-05 00:00
Modified
2024-08-07 11:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
xml/XMLHttpRequest.cpp in WebCore in WebKit before r38566 does not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:20:23.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=10957" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp" }, { "name": "33804", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33804" }, { "name": "webkit-xmlhttprequest-info-disclosure(48575)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48575" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "xml/XMLHttpRequest.cpp in WebCore in WebKit before r38566 does not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=10957" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp" }, { "name": "33804", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33804" }, { "name": "webkit-xmlhttprequest-info-disclosure(48575)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48575" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6059", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xml/XMLHttpRequest.cpp in WebCore in WebKit before r38566 does not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.webkit.org/show_bug.cgi?id=10957", "refsource": "CONFIRM", "url": "https://bugs.webkit.org/show_bug.cgi?id=10957" }, { "name": "http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp", "refsource": "CONFIRM", "url": "http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp" }, { "name": "33804", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33804" }, { "name": "webkit-xmlhttprequest-info-disclosure(48575)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48575" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6059", "datePublished": "2009-02-05T00:00:00", "dateReserved": "2009-02-04T00:00:00", "dateUpdated": "2024-08-07T11:20:23.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9643 (GCVE-0-2016-9643)
Vulnerability from cvelistv5
Published
2017-03-07 16:00
Modified
2024-08-06 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis).
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:59:03.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038137", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038137" }, { "name": "[oss-security] 20161126 Re: CVE Request: resource exhaustion in regex expression handling in WebKit", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/5" }, { "name": "GLSA-201706-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201706-15" }, { "name": "[oss-security] 20161126 CVE Request: resource exhaustion in regex expression handling in WebKit", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/2" }, { "name": "94559", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94559" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1038137", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038137" }, { "name": "[oss-security] 20161126 Re: CVE Request: resource exhaustion in regex expression handling in WebKit", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/5" }, { "name": "GLSA-201706-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201706-15" }, { "name": "[oss-security] 20161126 CVE Request: resource exhaustion in regex expression handling in WebKit", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/2" }, { "name": "94559", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94559" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-9643", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038137", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038137" }, { "name": "[oss-security] 20161126 Re: CVE Request: resource exhaustion in regex expression handling in WebKit", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/11/26/5" }, { "name": "GLSA-201706-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201706-15" }, { "name": "[oss-security] 20161126 CVE Request: resource exhaustion in regex expression handling in WebKit", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/11/26/2" }, { "name": "94559", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94559" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-9643", "datePublished": "2017-03-07T16:00:00", "dateReserved": "2016-11-26T00:00:00", "dateUpdated": "2024-08-06T02:59:03.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9642 (GCVE-0-2016-9642)
Vulnerability from cvelistv5
Published
2017-02-03 15:00
Modified
2024-08-06 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JavaScriptCore in WebKit allows attackers to cause a denial of service (out-of-bounds heap read) via a crafted Javascript file.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:59:03.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038137", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038137" }, { "name": "[oss-security] 20161126 Re: CVE request: Heap read out-of-bounds parsing a Javascript file with the last revision of JavaScript Core", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/4" }, { "name": "GLSA-201706-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201706-15" }, { "name": "94554", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94554" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-26T00:00:00", "descriptions": [ { "lang": "en", "value": "JavaScriptCore in WebKit allows attackers to cause a denial of service (out-of-bounds heap read) via a crafted Javascript file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1038137", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038137" }, { "name": "[oss-security] 20161126 Re: CVE request: Heap read out-of-bounds parsing a Javascript file with the last revision of JavaScript Core", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/4" }, { "name": "GLSA-201706-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201706-15" }, { "name": "94554", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94554" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-9642", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JavaScriptCore in WebKit allows attackers to cause a denial of service (out-of-bounds heap read) via a crafted Javascript file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038137", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038137" }, { "name": "[oss-security] 20161126 Re: CVE request: Heap read out-of-bounds parsing a Javascript file with the last revision of JavaScript Core", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/11/26/4" }, { "name": "GLSA-201706-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201706-15" }, { "name": "94554", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94554" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-9642", "datePublished": "2017-02-03T15:00:00", "dateReserved": "2016-11-26T00:00:00", "dateUpdated": "2024-08-06T02:59:03.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-39928 (GCVE-0-2023-39928)
Vulnerability from cvelistv5
Published
2023-10-06 15:17
Modified
2025-02-13 17:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-29T13:11:33.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831" }, { "name": "https://webkitgtk.org/security/WSA-2023-0009.html", "tags": [ "x_transferred" ], "url": "https://webkitgtk.org/security/WSA-2023-0009.html" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5527" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-33" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "product": "Webkit", "vendor": "Webkit", "versions": [ { "status": "affected", "version": "WebKitGTK 2.40.5" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by Marcin \u0026#39;Icewall\u0026#39; Noga of Cisco Talos." } ], "descriptions": [ { "lang": "en", "value": "A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-31T15:06:39.957Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831" }, { "name": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" }, { "url": "https://www.debian.org/security/2023/dsa-5527" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/" }, { "url": "https://security.gentoo.org/glsa/202401-33" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-39928", "datePublished": "2023-10-06T15:17:20.078Z", "dateReserved": "2023-08-14T16:33:45.829Z", "dateUpdated": "2025-02-13T17:03:15.748Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2009-02-05 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
xml/XMLHttpRequest.cpp in WebCore in WebKit before r38566 does not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp | ||
cve@mitre.org | http://www.securityfocus.com/bid/33804 | ||
cve@mitre.org | https://bugs.webkit.org/show_bug.cgi?id=10957 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/48575 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/33804 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.webkit.org/show_bug.cgi?id=10957 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/48575 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webkit:webkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB1AB1C4-1E35-44A3-A720-8A7D03FDC203", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "xml/XMLHttpRequest.cpp in WebCore in WebKit before r38566 does not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism." }, { "lang": "es", "value": "xml/XMLHttpRequest.cpp en WebCore de WebKit anterior a r38566, no restringe el acceso adecuadamente de las p\u00e1ginas Web de las cabeceras de respuesta HTTP (1) Set-Cookie y (2) Set-Cookie2; esto permite a atacantes remotos obtener informaci\u00f3n sensible de las cookies a trav\u00e9s de unas llamadas XMLHttpRequest, relacionadas con el mecanismo de protecci\u00f3n HTTPOnly." } ], "id": "CVE-2008-6059", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-02-05T00:30:00.250", "references": [ { "source": "cve@mitre.org", "url": "http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33804" }, { "source": "cve@mitre.org", "url": "https://bugs.webkit.org/show_bug.cgi?id=10957" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.webkit.org/show_bug.cgi?id=10957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48575" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-12 17:54
Modified
2025-04-09 00:30
Severity ?
Summary
WebKit before r50173, as used in Google Chrome before 3.0.195.32, allows remote attackers to cause a denial of service (CPU consumption) via a web page that calls the JavaScript setInterval method, which triggers an incompatibility between the WTF::currentTime and base::Time functions.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://code.google.com/p/chromium/issues/detail?id=25892 | ||
cve@mitre.org | http://codereview.chromium.org/339039 | Patch | |
cve@mitre.org | http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html | Vendor Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | ||
cve@mitre.org | http://secunia.com/advisories/43068 | ||
cve@mitre.org | http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311&r2=30310 | ||
cve@mitre.org | http://src.chromium.org/viewvc/chrome?view=rev&revision=30311 | ||
cve@mitre.org | http://trac.webkit.org/changeset/50173 | ||
cve@mitre.org | http://www.osvdb.org/59745 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2011/0212 | ||
cve@mitre.org | https://bugs.webkit.org/show_bug.cgi?id=30833 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/54297 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://code.google.com/p/chromium/issues/detail?id=25892 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://codereview.chromium.org/339039 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43068 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311&r2=30310 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://src.chromium.org/viewvc/chrome?view=rev&revision=30311 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://trac.webkit.org/changeset/50173 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/59745 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0212 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.webkit.org/show_bug.cgi?id=30833 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/54297 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
webkit | webkit | * | |
chrome | * | ||
chrome | 0.2.149.27 | ||
chrome | 0.2.149.29 | ||
chrome | 0.2.149.30 | ||
chrome | 0.2.152.1 | ||
chrome | 0.2.153.1 | ||
chrome | 0.3.154.0 | ||
chrome | 0.3.154.3 | ||
chrome | 0.4.154.18 | ||
chrome | 0.4.154.22 | ||
chrome | 0.4.154.31 | ||
chrome | 0.4.154.33 | ||
chrome | 1.0.154.36 | ||
chrome | 1.0.154.39 | ||
chrome | 1.0.154.42 | ||
chrome | 1.0.154.43 | ||
chrome | 1.0.154.46 | ||
chrome | 1.0.154.48 | ||
chrome | 1.0.154.52 | ||
chrome | 1.0.154.53 | ||
chrome | 1.0.154.59 | ||
chrome | 1.0.154.65 | ||
chrome | 2.0.156.1 | ||
chrome | 2.0.157.0 | ||
chrome | 2.0.157.2 | ||
chrome | 2.0.158.0 | ||
chrome | 2.0.159.0 | ||
chrome | 2.0.169.0 | ||
chrome | 2.0.169.1 | ||
chrome | 2.0.170.0 | ||
chrome | 2.0.172 | ||
chrome | 2.0.172.2 | ||
chrome | 2.0.172.8 | ||
chrome | 2.0.172.27 | ||
chrome | 2.0.172.28 | ||
chrome | 2.0.172.30 | ||
chrome | 2.0.172.31 | ||
chrome | 2.0.172.33 | ||
chrome | 2.0.172.37 | ||
chrome | 2.0.172.38 | ||
chrome | 3.0.182.2 | ||
chrome | 3.0.190.2 | ||
chrome | 3.0.193.2 | ||
chrome | 3.0.195.21 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webkit:webkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03C9DF-4438-4521-A0FA-D23A414F19CA", "versionEndIncluding": "r50173", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "7008C925-403A-4900-AEEF-7530792E770C", "versionEndIncluding": "3.0.195.24", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*", "matchCriteriaId": "D55D5075-D233-42D6-B1D6-77B7599650EB", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*", "matchCriteriaId": "5B8FF77A-7802-4963-B532-3F16C7BB012C", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*", "matchCriteriaId": "D73576CF-76EE-42A3-9955-D7991384B8C1", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD4A2AB1-6F90-4D0B-A673-C6310514CE63", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "66A4FEB5-11D8-4FFC-972D-A3B991176040", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6313614-FC3C-488C-B80B-191797319A56", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*", "matchCriteriaId": "9CDF3DAB-73C4-48E8-9B0B-DADABF217555", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FAE50-4CA3-46F6-B533-C599011A9ED5", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*", "matchCriteriaId": "B0D94F22-37B6-4938-966A-E1830D83FBC3", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*", "matchCriteriaId": "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*", "matchCriteriaId": "0C0F9D75-B10D-468F-84D8-61B6A1230556", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*", "matchCriteriaId": "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*", "matchCriteriaId": "173D539E-045E-4429-80C9-5749BECC6CD5", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*", "matchCriteriaId": "D2052352-FECC-4990-B0F4-A715694AD816", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*", "matchCriteriaId": "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*", "matchCriteriaId": "E37938BB-8368-46D6-A8E4-F99F5CB9B82E", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:*", "matchCriteriaId": "6659833E-E309-4797-84D4-A782237714A9", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:*", "matchCriteriaId": "FE4C0D93-0308-48D4-A953-9398B88E2868", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*", "matchCriteriaId": "FE5094C4-1338-4189-B5FD-C9AFFF091D6B", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*", "matchCriteriaId": "51A8C3D2-82E6-453E-90B7-BA5C5D2CDF54", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:1.0.154.65:*:*:*:*:*:*:*", "matchCriteriaId": "67C0798F-CC7F-4069-810E-B81F8BB77CCD", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2F95770-F36F-43C0-986F-5C819648271E", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECCE1FD3-8D27-4304-97F9-6F9689F2498D", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*", "matchCriteriaId": "0F6CA696-49AA-4445-B978-96C1D8CE58DF", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9CFA3BF-6C07-448B-8C83-AD4C524A6577", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8497F93-D88A-4FFA-B988-7210608530A8", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:*", "matchCriteriaId": "49FB50A3-FFDA-4BB9-A2C1-DA6DACC2DAAB", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:*", "matchCriteriaId": "59F93BC8-FE87-4CEC-B28A-4B0B5A468EDE", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D459C7-2555-42FA-9C68-619E410D7CBA", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*", "matchCriteriaId": "E5CDF938-2998-403F-B343-29B620E05D44", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:*", "matchCriteriaId": "64F89EA6-B411-4887-90A1-FF3A054424F6", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:*", "matchCriteriaId": "10D2BA3B-1C69-470C-9C40-001FAE82DDB4", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:*", "matchCriteriaId": "3583995C-CD74-401F-905D-65B73CFC4595", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*", "matchCriteriaId": "A0A621B1-3186-4CE2-8BCC-916027CC74CF", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*", "matchCriteriaId": "B4A9B50D-5B0F-41C9-8FAF-B78CD21A0554", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*", "matchCriteriaId": "4F5223F1-85CD-4DF9-9665-BDF7B554A784", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:*", "matchCriteriaId": "8DD7AFBA-A9A2-4EE9-B652-78D25EFBB690", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*", "matchCriteriaId": "6B9D6ED9-D5C5-4CA9-84EA-8007F48CF597", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:*", "matchCriteriaId": "0E7F7897-ECD1-499E-81CD-E224241B6607", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7422307-271F-4953-9CA4-C50238D27BAE", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:*", "matchCriteriaId": "9DCC3490-5B06-4992-8E31-CA46E18607B7", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:3.0.193.2:beta:*:*:*:*:*:*", "matchCriteriaId": "C2F85551-EDB5-4790-8095-EFFA7DEC7F98", "vulnerable": false }, { "criteria": "cpe:2.3:a:google:chrome:3.0.195.21:*:*:*:*:*:*:*", "matchCriteriaId": "6FEBB1A8-295B-4AF7-996D-F7E415B91ECB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WebKit before r50173, as used in Google Chrome before 3.0.195.32, allows remote attackers to cause a denial of service (CPU consumption) via a web page that calls the JavaScript setInterval method, which triggers an incompatibility between the WTF::currentTime and base::Time functions." }, { "lang": "es", "value": "WebKit en versiones anteriores a la r50173, tal como se usa en Google Chrome en versiones anteriores a la 3.0.195.32, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) mediante una p\u00e1gina web que llama al m\u00e9todo JavaScript setInterval, el cual dispara una incompatibilidad entre las funciones WTF::currentTime y base::Time." } ], "id": "CVE-2009-3933", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-11-12T17:54:58.530", "references": [ { "source": "cve@mitre.org", "url": "http://code.google.com/p/chromium/issues/detail?id=25892" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://codereview.chromium.org/339039" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/43068" }, { "source": "cve@mitre.org", "url": "http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311\u0026r2=30310" }, { "source": "cve@mitre.org", "url": "http://src.chromium.org/viewvc/chrome?view=rev\u0026revision=30311" }, { "source": "cve@mitre.org", "url": "http://trac.webkit.org/changeset/50173" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/59745" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "source": "cve@mitre.org", "url": "https://bugs.webkit.org/show_bug.cgi?id=30833" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/chromium/issues/detail?id=25892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://codereview.chromium.org/339039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311\u0026r2=30310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://src.chromium.org/viewvc/chrome?view=rev\u0026revision=30311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://trac.webkit.org/changeset/50173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/59745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.webkit.org/show_bug.cgi?id=30833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54297" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-03 15:59
Modified
2025-04-20 01:37
Severity ?
Summary
JavaScriptCore in WebKit allows attackers to cause a denial of service (out-of-bounds heap read) via a crafted Javascript file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/11/26/4 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/94554 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1038137 | ||
cve@mitre.org | https://security.gentoo.org/glsa/201706-15 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/11/26/4 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94554 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038137 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201706-15 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webkit:webkit:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA80D441-2FBF-46F0-8C44-EB5423BD6B6E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JavaScriptCore in WebKit allows attackers to cause a denial of service (out-of-bounds heap read) via a crafted Javascript file." }, { "lang": "es", "value": "JavaScriptCore en WebKit permite a atacantes provocar una denegaci\u00f3n de servicio (lectura de memoria din\u00e1mica fuera de l\u00edmites) a trav\u00e9s de un archivo Javascript manipulado." } ], "id": "CVE-2016-9642", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-03T15:59:00.837", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94554" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038137" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201706-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201706-15" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-22 05:42
Modified
2025-04-11 00:51
Severity ?
Summary
Off-by-one error in the WebSocketHandshake::readServerHandshake function in websockets/WebSocketHandshake.cpp in WebCore in WebKit before r56380, as used in Qt and other products, allows remote websockets servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an upgrade header that is long and invalid.
References
▶ | URL | Tags | |
---|---|---|---|
product-security@apple.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html | ||
product-security@apple.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html | ||
product-security@apple.com | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | ||
product-security@apple.com | http://secunia.com/advisories/40557 | Vendor Advisory | |
product-security@apple.com | http://secunia.com/advisories/41856 | Vendor Advisory | |
product-security@apple.com | http://secunia.com/advisories/43068 | Vendor Advisory | |
product-security@apple.com | http://trac.webkit.org/changeset/56380 | ||
product-security@apple.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 | ||
product-security@apple.com | http://www.ubuntu.com/usn/USN-1006-1 | ||
product-security@apple.com | http://www.vupen.com/english/advisories/2010/1801 | Vendor Advisory | |
product-security@apple.com | http://www.vupen.com/english/advisories/2010/2722 | ||
product-security@apple.com | http://www.vupen.com/english/advisories/2011/0212 | ||
product-security@apple.com | http://www.vupen.com/english/advisories/2011/0552 | ||
product-security@apple.com | https://bugs.webkit.org/show_bug.cgi?id=36339 | ||
product-security@apple.com | https://bugzilla.redhat.com/show_bug.cgi?id=596494 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40557 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/41856 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43068 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://trac.webkit.org/changeset/56380 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1006-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1801 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2722 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0212 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0552 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.webkit.org/show_bug.cgi?id=36339 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=596494 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F543EF-AFA9-42EA-B60B-33711005EAB0", "versionEndIncluding": "4.6.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:webkit:webkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF922448-569B-440D-9695-3D063848023D", "versionEndIncluding": "r56379", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Off-by-one error in the WebSocketHandshake::readServerHandshake function in websockets/WebSocketHandshake.cpp in WebCore in WebKit before r56380, as used in Qt and other products, allows remote websockets servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an upgrade header that is long and invalid." }, { "lang": "es", "value": "Error de superaci\u00f3n de l\u00edmite en la funci\u00f3n WebSocketHandshake::readServerHandshake en websockets/WebSocketHandshake.cpp en WebCore en WebKit anterior a r56380, utilizado en Qt y otros productos, permite a los servidores de websockets remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria), o posiblemente tener otro impacto no especificado a trav\u00e9s de una cabecera de actualizaci\u00f3n que es larga e inv\u00e1lida." } ], "id": "CVE-2010-1766", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-07-22T05:42:55.877", "references": [ { "source": "product-security@apple.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html" }, { "source": "product-security@apple.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html" }, { "source": "product-security@apple.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40557" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41856" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43068" }, { "source": "product-security@apple.com", "url": "http://trac.webkit.org/changeset/56380" }, { "source": "product-security@apple.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039" }, { "source": "product-security@apple.com", "url": "http://www.ubuntu.com/usn/USN-1006-1" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1801" }, { "source": "product-security@apple.com", "url": "http://www.vupen.com/english/advisories/2010/2722" }, { "source": "product-security@apple.com", "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "source": "product-security@apple.com", "url": "http://www.vupen.com/english/advisories/2011/0552" }, { "source": "product-security@apple.com", "url": "https://bugs.webkit.org/show_bug.cgi?id=36339" }, { "source": "product-security@apple.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://trac.webkit.org/changeset/56380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1006-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.webkit.org/show_bug.cgi?id=36339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596494" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-07 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/11/26/2 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/11/26/5 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/94559 | ||
cve@mitre.org | http://www.securitytracker.com/id/1038137 | ||
cve@mitre.org | https://security.gentoo.org/glsa/201706-15 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/11/26/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/11/26/5 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94559 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038137 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201706-15 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webkit:webkit:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "20190523-F188-4F2A-ABD5-4FB747244CAF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis)." }, { "lang": "es", "value": "El c\u00f3digo regex en Webkit 2.4.11 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) como se demuestra en un gran n\u00famero de ($ (abrir par\u00e9ntesis y d\u00f3lar) seguido de {-2,16} y un gran n\u00famero de +) (suma cerrar par\u00e9ntesis)." } ], "id": "CVE-2016-9643", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-07T16:59:01.650", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/2" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/5" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/94559" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038137" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201706-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/26/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/94559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201706-15" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }