Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-3105 (GCVE-0-2011-3105)
Vulnerability from cvelistv5 – Published: 2012-05-24 18:00 – Updated: 2024-08-06 23:22- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:22:27.596Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:15535",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535"
},
{
"name": "APPLE-SA-2012-09-19-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "GLSA-201205-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201205-04.xml"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5485"
},
{
"name": "APPLE-SA-2012-09-19-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5503"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5502"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=120912"
},
{
"name": "53679",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/53679"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
},
{
"name": "1027098",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1027098"
},
{
"name": "82242",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/82242"
},
{
"name": "APPLE-SA-2012-09-12-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name": "49306",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49306"
},
{
"name": "49277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49277"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-05-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "oval:org.mitre.oval:def:15535",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535"
},
{
"name": "APPLE-SA-2012-09-19-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "GLSA-201205-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201205-04.xml"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5485"
},
{
"name": "APPLE-SA-2012-09-19-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5503"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5502"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=120912"
},
{
"name": "53679",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/53679"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
},
{
"name": "1027098",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1027098"
},
{
"name": "82242",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/82242"
},
{
"name": "APPLE-SA-2012-09-12-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name": "49306",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49306"
},
{
"name": "49277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49277"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3105",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:15535",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535"
},
{
"name": "APPLE-SA-2012-09-19-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "GLSA-201205-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201205-04.xml"
},
{
"name": "http://support.apple.com/kb/HT5485",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5485"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "http://support.apple.com/kb/HT5502",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=120912",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=120912"
},
{
"name": "53679",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53679"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
},
{
"name": "1027098",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027098"
},
{
"name": "82242",
"refsource": "OSVDB",
"url": "http://osvdb.org/82242"
},
{
"name": "APPLE-SA-2012-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name": "49306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49306"
},
{
"name": "49277",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49277"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-3105",
"datePublished": "2012-05-24T18:00:00.000Z",
"dateReserved": "2011-08-09T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:22:27.596Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2012-AVI-514
Vulnerability from certfr_avis - Published: 2012-09-21 - Updated: 2012-09-21
De multiples vulnérabilités ont été corrigées dans IOS 6. Certaines d'entre elles permettent à un attaquant d'exécuter du code arbitraire à distance au moyen de pages Web spécialement conçues.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à IOS 6.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 IOS 6.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3048",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3048"
},
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2011-3089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3089"
},
{
"name": "CVE-2011-3050",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3050"
},
{
"name": "CVE-2012-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3618"
},
{
"name": "CVE-2012-3663",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3663"
},
{
"name": "CVE-2012-3746",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3746"
},
{
"name": "CVE-2012-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3651"
},
{
"name": "CVE-2011-3924",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3924"
},
{
"name": "CVE-2012-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3658"
},
{
"name": "CVE-2012-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3611"
},
{
"name": "CVE-2012-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3598"
},
{
"name": "CVE-2012-3638",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3638"
},
{
"name": "CVE-2012-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1521"
},
{
"name": "CVE-2012-3745",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3745"
},
{
"name": "CVE-2012-3624",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3624"
},
{
"name": "CVE-2012-3664",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3664"
},
{
"name": "CVE-2012-1144",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1144"
},
{
"name": "CVE-2012-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3592"
},
{
"name": "CVE-2012-3741",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3741"
},
{
"name": "CVE-2011-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3068"
},
{
"name": "CVE-2012-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3652"
},
{
"name": "CVE-2012-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1127"
},
{
"name": "CVE-2012-1129",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1129"
},
{
"name": "CVE-2012-3674",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3674"
},
{
"name": "CVE-2011-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3090"
},
{
"name": "CVE-2012-3641",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3641"
},
{
"name": "CVE-2012-3696",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3696"
},
{
"name": "CVE-2012-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3626"
},
{
"name": "CVE-2011-3069",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3069"
},
{
"name": "CVE-2012-1143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1143"
},
{
"name": "CVE-2012-3637",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3637"
},
{
"name": "CVE-2012-3680",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3680"
},
{
"name": "CVE-2012-3636",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3636"
},
{
"name": "CVE-2012-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3615"
},
{
"name": "CVE-2012-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3730"
},
{
"name": "CVE-2012-1131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1131"
},
{
"name": "CVE-2012-1173",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1173"
},
{
"name": "CVE-2012-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3744"
},
{
"name": "CVE-2012-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3610"
},
{
"name": "CVE-2012-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3653"
},
{
"name": "CVE-2011-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3032"
},
{
"name": "CVE-2012-3667",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3667"
},
{
"name": "CVE-2012-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3608"
},
{
"name": "CVE-2012-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3617"
},
{
"name": "CVE-2012-3645",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3645"
},
{
"name": "CVE-2011-3064",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3064"
},
{
"name": "CVE-2012-1132",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1132"
},
{
"name": "CVE-2011-3021",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3021"
},
{
"name": "CVE-2012-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3738"
},
{
"name": "CVE-2012-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3640"
},
{
"name": "CVE-2012-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3733"
},
{
"name": "CVE-2011-3040",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3040"
},
{
"name": "CVE-2012-3676",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3676"
},
{
"name": "CVE-2012-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3605"
},
{
"name": "CVE-2011-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3016"
},
{
"name": "CVE-2011-3969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3969"
},
{
"name": "CVE-2012-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3732"
},
{
"name": "CVE-2012-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3604"
},
{
"name": "CVE-2012-3686",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3686"
},
{
"name": "CVE-2012-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3635"
},
{
"name": "CVE-2012-3666",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3666"
},
{
"name": "CVE-2012-3740",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3740"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-1520",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1520"
},
{
"name": "CVE-2012-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3596"
},
{
"name": "CVE-2012-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3627"
},
{
"name": "CVE-2011-3966",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3966"
},
{
"name": "CVE-2012-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3602"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2012-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1130"
},
{
"name": "CVE-2011-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3034"
},
{
"name": "CVE-2012-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3597"
},
{
"name": "CVE-2012-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3614"
},
{
"name": "CVE-2011-3043",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3043"
},
{
"name": "CVE-2011-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2845"
},
{
"name": "CVE-2011-3027",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3027"
},
{
"name": "CVE-2012-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3731"
},
{
"name": "CVE-2011-3926",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3926"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2012-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3650"
},
{
"name": "CVE-2012-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3669"
},
{
"name": "CVE-2012-3661",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3661"
},
{
"name": "CVE-2011-3060",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3060"
},
{
"name": "CVE-2011-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3105"
},
{
"name": "CVE-2011-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3968"
},
{
"name": "CVE-2012-0683",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0683"
},
{
"name": "CVE-2012-3729",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3729"
},
{
"name": "CVE-2011-3053",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3053"
},
{
"name": "CVE-2011-3039",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3039"
},
{
"name": "CVE-2012-3734",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3734"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-3589",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3589"
},
{
"name": "CVE-2012-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3647"
},
{
"name": "CVE-2012-1128",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1128"
},
{
"name": "CVE-2012-3691",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3691"
},
{
"name": "CVE-2012-3684",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3684"
},
{
"name": "CVE-2012-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3634"
},
{
"name": "CVE-2012-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3677"
},
{
"name": "CVE-2012-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3646"
},
{
"name": "CVE-2011-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3073"
},
{
"name": "CVE-2012-3724",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3724"
},
{
"name": "CVE-2011-3971",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3971"
},
{
"name": "CVE-2011-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3076"
},
{
"name": "CVE-2012-3671",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3671"
},
{
"name": "CVE-2012-1133",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1133"
},
{
"name": "CVE-2012-3603",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3603"
},
{
"name": "CVE-2012-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3695"
},
{
"name": "CVE-2012-1136",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1136"
},
{
"name": "CVE-2012-3739",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3739"
},
{
"name": "CVE-2012-1134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1134"
},
{
"name": "CVE-2012-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1126"
},
{
"name": "CVE-2011-3042",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3042"
},
{
"name": "CVE-2012-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3655"
},
{
"name": "CVE-2012-1137",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1137"
},
{
"name": "CVE-2011-3059",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3059"
},
{
"name": "CVE-2011-3036",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3036"
},
{
"name": "CVE-2012-3722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3722"
},
{
"name": "CVE-2012-3673",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3673"
},
{
"name": "CVE-2012-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3613"
},
{
"name": "CVE-2012-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0682"
},
{
"name": "CVE-2011-3041",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3041"
},
{
"name": "CVE-2011-3958",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3958"
},
{
"name": "CVE-2012-3590",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3590"
},
{
"name": "CVE-2012-3593",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3593"
},
{
"name": "CVE-2011-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3035"
},
{
"name": "CVE-2012-3725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3725"
},
{
"name": "CVE-2012-3678",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3678"
},
{
"name": "CVE-2012-1140",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1140"
},
{
"name": "CVE-2012-1139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1139"
},
{
"name": "CVE-2011-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3074"
},
{
"name": "CVE-2012-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3659"
},
{
"name": "CVE-2012-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2815"
},
{
"name": "CVE-2012-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3594"
},
{
"name": "CVE-2011-3913",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3913"
},
{
"name": "CVE-2012-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3743"
},
{
"name": "CVE-2012-3644",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3644"
},
{
"name": "CVE-2012-3726",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3726"
},
{
"name": "CVE-2012-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3633"
},
{
"name": "CVE-2012-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3728"
},
{
"name": "CVE-2011-3026",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3026"
},
{
"name": "CVE-2012-3708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3708"
},
{
"name": "CVE-2012-3747",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3747"
},
{
"name": "CVE-2012-3742",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3742"
},
{
"name": "CVE-2012-3642",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3642"
},
{
"name": "CVE-2012-3591",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3591"
},
{
"name": "CVE-2011-3075",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3075"
},
{
"name": "CVE-2011-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3081"
},
{
"name": "CVE-2011-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3071"
},
{
"name": "CVE-2012-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3679"
},
{
"name": "CVE-2012-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3710"
},
{
"name": "CVE-2012-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3629"
},
{
"name": "CVE-2011-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3037"
},
{
"name": "CVE-2011-3457",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3457"
},
{
"name": "CVE-2012-3595",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3595"
},
{
"name": "CVE-2012-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3670"
},
{
"name": "CVE-2012-0680",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0680"
},
{
"name": "CVE-2012-3601",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3601"
},
{
"name": "CVE-2012-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3628"
},
{
"name": "CVE-2012-3681",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3681"
},
{
"name": "CVE-2011-3044",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3044"
},
{
"name": "CVE-2012-3631",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3631"
},
{
"name": "CVE-2012-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3665"
},
{
"name": "CVE-2012-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3612"
},
{
"name": "CVE-2012-1138",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1138"
},
{
"name": "CVE-2012-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3599"
},
{
"name": "CVE-2012-3704",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3704"
},
{
"name": "CVE-2012-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3625"
},
{
"name": "CVE-2012-3683",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3683"
},
{
"name": "CVE-2011-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3078"
},
{
"name": "CVE-2012-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3736"
},
{
"name": "CVE-2012-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3672"
},
{
"name": "CVE-2012-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3609"
},
{
"name": "CVE-2012-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3660"
},
{
"name": "CVE-2012-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3600"
},
{
"name": "CVE-2011-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3067"
},
{
"name": "CVE-2012-1135",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1135"
},
{
"name": "CVE-2012-3706",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3706"
},
{
"name": "CVE-2012-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3620"
},
{
"name": "CVE-2012-3727",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3727"
},
{
"name": "CVE-2012-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3737"
},
{
"name": "CVE-2012-3703",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3703"
},
{
"name": "CVE-2012-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3648"
},
{
"name": "CVE-2012-1142",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1142"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3735"
},
{
"name": "CVE-2012-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3656"
},
{
"name": "CVE-2012-1141",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1141"
},
{
"name": "CVE-2011-3086",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3086"
},
{
"name": "CVE-2012-3630",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3630"
},
{
"name": "CVE-2012-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3693"
},
{
"name": "CVE-2012-3682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3682"
},
{
"name": "CVE-2011-3038",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3038"
},
{
"name": "CVE-2012-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3639"
},
{
"name": "CVE-2011-4599",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4599"
},
{
"name": "CVE-2012-2818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2818"
},
{
"name": "CVE-2012-3668",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3668"
}
],
"initial_release_date": "2012-09-21T00:00:00",
"last_revision_date": "2012-09-21T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5503 :",
"url": "http://support.apple.com/kb/HT5503"
}
],
"reference": "CERTA-2012-AVI-514",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eIOS 6\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au moyen de pages Web\nsp\u00e9cialement con\u00e7ues.\n",
"title": "Multiples Vuln\u00e9rabilit\u00e9s dans IOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curi\u00e9 Apple HT5503 du 19 Septembre 2012",
"url": null
}
]
}
CERTA-2012-AVI-506
Vulnerability from certfr_avis - Published: 2012-09-14 - Updated: 2012-09-14
De multiples vulnérabilités ont été corrigées dans Apple iTunes. Elles concernent le composant WebKit sur l'environnement Windows.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à iTunes 10.7.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 iTunes 10.7.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3623"
},
{
"name": "CVE-2011-3089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3089"
},
{
"name": "CVE-2011-3050",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3050"
},
{
"name": "CVE-2012-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3618"
},
{
"name": "CVE-2012-3663",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3663"
},
{
"name": "CVE-2012-3622",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3622"
},
{
"name": "CVE-2012-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3651"
},
{
"name": "CVE-2012-3699",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3699"
},
{
"name": "CVE-2011-3924",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3924"
},
{
"name": "CVE-2012-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3658"
},
{
"name": "CVE-2012-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3611"
},
{
"name": "CVE-2012-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3598"
},
{
"name": "CVE-2012-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3607"
},
{
"name": "CVE-2012-3638",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3638"
},
{
"name": "CVE-2012-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1521"
},
{
"name": "CVE-2012-3624",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3624"
},
{
"name": "CVE-2012-2831",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2831"
},
{
"name": "CVE-2012-3664",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3664"
},
{
"name": "CVE-2012-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3592"
},
{
"name": "CVE-2011-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3068"
},
{
"name": "CVE-2012-3675",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3675"
},
{
"name": "CVE-2012-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3657"
},
{
"name": "CVE-2012-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3652"
},
{
"name": "CVE-2012-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3643"
},
{
"name": "CVE-2012-3674",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3674"
},
{
"name": "CVE-2011-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3090"
},
{
"name": "CVE-2012-3641",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3641"
},
{
"name": "CVE-2012-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3626"
},
{
"name": "CVE-2011-3069",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3069"
},
{
"name": "CVE-2012-3637",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3637"
},
{
"name": "CVE-2012-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3688"
},
{
"name": "CVE-2012-3680",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3680"
},
{
"name": "CVE-2012-3636",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3636"
},
{
"name": "CVE-2012-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3615"
},
{
"name": "CVE-2012-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3610"
},
{
"name": "CVE-2012-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3653"
},
{
"name": "CVE-2012-3701",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3701"
},
{
"name": "CVE-2011-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3032"
},
{
"name": "CVE-2012-3667",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3667"
},
{
"name": "CVE-2012-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3608"
},
{
"name": "CVE-2012-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3617"
},
{
"name": "CVE-2012-3645",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3645"
},
{
"name": "CVE-2011-3064",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3064"
},
{
"name": "CVE-2011-3021",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3021"
},
{
"name": "CVE-2012-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3640"
},
{
"name": "CVE-2011-3040",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3040"
},
{
"name": "CVE-2012-3676",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3676"
},
{
"name": "CVE-2012-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3605"
},
{
"name": "CVE-2011-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3016"
},
{
"name": "CVE-2011-3969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3969"
},
{
"name": "CVE-2012-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3604"
},
{
"name": "CVE-2012-3686",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3686"
},
{
"name": "CVE-2012-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3635"
},
{
"name": "CVE-2012-3666",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3666"
},
{
"name": "CVE-2012-1520",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1520"
},
{
"name": "CVE-2012-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3596"
},
{
"name": "CVE-2012-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3627"
},
{
"name": "CVE-2011-3966",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3966"
},
{
"name": "CVE-2012-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3602"
},
{
"name": "CVE-2012-2843",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2843"
},
{
"name": "CVE-2011-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3034"
},
{
"name": "CVE-2012-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3597"
},
{
"name": "CVE-2012-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3614"
},
{
"name": "CVE-2012-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3705"
},
{
"name": "CVE-2011-3043",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3043"
},
{
"name": "CVE-2012-3654",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3654"
},
{
"name": "CVE-2011-3027",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3027"
},
{
"name": "CVE-2011-3926",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3926"
},
{
"name": "CVE-2012-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3669"
},
{
"name": "CVE-2012-3661",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3661"
},
{
"name": "CVE-2011-3060",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3060"
},
{
"name": "CVE-2011-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3105"
},
{
"name": "CVE-2012-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2829"
},
{
"name": "CVE-2012-3685",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3685"
},
{
"name": "CVE-2011-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3968"
},
{
"name": "CVE-2012-0683",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0683"
},
{
"name": "CVE-2011-3053",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3053"
},
{
"name": "CVE-2011-3039",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3039"
},
{
"name": "CVE-2012-3692",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3692"
},
{
"name": "CVE-2012-3589",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3589"
},
{
"name": "CVE-2012-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3647"
},
{
"name": "CVE-2012-3684",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3684"
},
{
"name": "CVE-2012-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3634"
},
{
"name": "CVE-2012-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3677"
},
{
"name": "CVE-2012-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3646"
},
{
"name": "CVE-2011-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3073"
},
{
"name": "CVE-2011-3971",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3971"
},
{
"name": "CVE-2011-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3076"
},
{
"name": "CVE-2012-3671",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3671"
},
{
"name": "CVE-2012-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3606"
},
{
"name": "CVE-2012-3603",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3603"
},
{
"name": "CVE-2012-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3709"
},
{
"name": "CVE-2011-3042",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3042"
},
{
"name": "CVE-2012-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3655"
},
{
"name": "CVE-2011-3059",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3059"
},
{
"name": "CVE-2011-3036",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3036"
},
{
"name": "CVE-2012-3673",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3673"
},
{
"name": "CVE-2012-2842",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2842"
},
{
"name": "CVE-2012-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3613"
},
{
"name": "CVE-2012-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0682"
},
{
"name": "CVE-2011-3041",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3041"
},
{
"name": "CVE-2011-3958",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3958"
},
{
"name": "CVE-2012-3590",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3590"
},
{
"name": "CVE-2012-3593",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3593"
},
{
"name": "CVE-2011-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3035"
},
{
"name": "CVE-2012-3678",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3678"
},
{
"name": "CVE-2011-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3074"
},
{
"name": "CVE-2012-3700",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3700"
},
{
"name": "CVE-2012-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3659"
},
{
"name": "CVE-2012-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3594"
},
{
"name": "CVE-2011-3913",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3913"
},
{
"name": "CVE-2012-3644",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3644"
},
{
"name": "CVE-2012-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3633"
},
{
"name": "CVE-2012-3708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3708"
},
{
"name": "CVE-2012-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3616"
},
{
"name": "CVE-2012-3642",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3642"
},
{
"name": "CVE-2012-3591",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3591"
},
{
"name": "CVE-2011-3075",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3075"
},
{
"name": "CVE-2011-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3081"
},
{
"name": "CVE-2011-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3071"
},
{
"name": "CVE-2012-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3679"
},
{
"name": "CVE-2012-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3710"
},
{
"name": "CVE-2012-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3629"
},
{
"name": "CVE-2011-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3037"
},
{
"name": "CVE-2012-3595",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3595"
},
{
"name": "CVE-2012-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3670"
},
{
"name": "CVE-2012-3601",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3601"
},
{
"name": "CVE-2012-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3628"
},
{
"name": "CVE-2012-3681",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3681"
},
{
"name": "CVE-2011-3044",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3044"
},
{
"name": "CVE-2012-3631",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3631"
},
{
"name": "CVE-2012-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3665"
},
{
"name": "CVE-2012-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3612"
},
{
"name": "CVE-2012-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3599"
},
{
"name": "CVE-2012-3704",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3704"
},
{
"name": "CVE-2012-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3632"
},
{
"name": "CVE-2012-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3625"
},
{
"name": "CVE-2012-3683",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3683"
},
{
"name": "CVE-2012-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2817"
},
{
"name": "CVE-2011-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3078"
},
{
"name": "CVE-2012-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3672"
},
{
"name": "CVE-2012-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3609"
},
{
"name": "CVE-2012-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3660"
},
{
"name": "CVE-2012-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3600"
},
{
"name": "CVE-2012-3706",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3706"
},
{
"name": "CVE-2012-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3620"
},
{
"name": "CVE-2012-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3707"
},
{
"name": "CVE-2012-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3702"
},
{
"name": "CVE-2012-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3621"
},
{
"name": "CVE-2012-3703",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3703"
},
{
"name": "CVE-2012-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3711"
},
{
"name": "CVE-2012-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3648"
},
{
"name": "CVE-2012-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3649"
},
{
"name": "CVE-2012-3687",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3687"
},
{
"name": "CVE-2012-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3656"
},
{
"name": "CVE-2011-3086",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3086"
},
{
"name": "CVE-2012-3630",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3630"
},
{
"name": "CVE-2012-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3712"
},
{
"name": "CVE-2012-3682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3682"
},
{
"name": "CVE-2011-3038",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3038"
},
{
"name": "CVE-2012-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3639"
},
{
"name": "CVE-2012-2818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2818"
},
{
"name": "CVE-2012-3668",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3668"
}
],
"initial_release_date": "2012-09-14T00:00:00",
"last_revision_date": "2012-09-14T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-506",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple iTunes\u003c/span\u003e. Elles concernent le composant \u003cspan\nclass=\"textit\"\u003eWebKit\u003c/span\u003e sur l\u0027environnement \u003cspan\nclass=\"textit\"\u003eWindows\u003c/span\u003e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple iTunes",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 12 septembre 2012",
"url": "http://support.apple.com/kb/HT5485"
}
]
}
CERTA-2012-AVI-513
Vulnerability from certfr_avis - Published: 2012-09-21 - Updated: 2012-09-21
De multiples vulnérabilités ont été corrigées dans Safari 6.0.1. Certaines d'entre elles permettent à un attaquant d'exécuter du code arbitraire à distance au moyen de pages Web spécialement conçues.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à Safari 6.0.1.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 Safari 6.0.1.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3623"
},
{
"name": "CVE-2012-3622",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3622"
},
{
"name": "CVE-2012-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3651"
},
{
"name": "CVE-2012-3699",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3699"
},
{
"name": "CVE-2012-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3658"
},
{
"name": "CVE-2012-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3598"
},
{
"name": "CVE-2012-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3607"
},
{
"name": "CVE-2012-3713",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3713"
},
{
"name": "CVE-2012-3624",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3624"
},
{
"name": "CVE-2012-2831",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2831"
},
{
"name": "CVE-2012-3675",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3675"
},
{
"name": "CVE-2012-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3657"
},
{
"name": "CVE-2012-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3652"
},
{
"name": "CVE-2012-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3643"
},
{
"name": "CVE-2012-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3688"
},
{
"name": "CVE-2012-3701",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3701"
},
{
"name": "CVE-2012-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3617"
},
{
"name": "CVE-2012-3676",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3676"
},
{
"name": "CVE-2012-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3602"
},
{
"name": "CVE-2012-2843",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2843"
},
{
"name": "CVE-2012-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3614"
},
{
"name": "CVE-2012-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3705"
},
{
"name": "CVE-2012-3654",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3654"
},
{
"name": "CVE-2011-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3105"
},
{
"name": "CVE-2012-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2829"
},
{
"name": "CVE-2012-3685",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3685"
},
{
"name": "CVE-2012-3692",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3692"
},
{
"name": "CVE-2012-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3647"
},
{
"name": "CVE-2012-3684",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3684"
},
{
"name": "CVE-2012-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3677"
},
{
"name": "CVE-2012-3671",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3671"
},
{
"name": "CVE-2012-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3606"
},
{
"name": "CVE-2012-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3709"
},
{
"name": "CVE-2012-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3715"
},
{
"name": "CVE-2012-3673",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3673"
},
{
"name": "CVE-2012-2842",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2842"
},
{
"name": "CVE-2012-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3613"
},
{
"name": "CVE-2012-3700",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3700"
},
{
"name": "CVE-2012-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3659"
},
{
"name": "CVE-2012-3708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3708"
},
{
"name": "CVE-2012-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3616"
},
{
"name": "CVE-2012-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3714"
},
{
"name": "CVE-2012-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3710"
},
{
"name": "CVE-2012-3601",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3601"
},
{
"name": "CVE-2012-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3612"
},
{
"name": "CVE-2012-3704",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3704"
},
{
"name": "CVE-2012-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3632"
},
{
"name": "CVE-2012-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2817"
},
{
"name": "CVE-2012-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3672"
},
{
"name": "CVE-2012-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3660"
},
{
"name": "CVE-2012-3706",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3706"
},
{
"name": "CVE-2012-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3707"
},
{
"name": "CVE-2012-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3702"
},
{
"name": "CVE-2012-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3621"
},
{
"name": "CVE-2012-3703",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3703"
},
{
"name": "CVE-2012-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3711"
},
{
"name": "CVE-2012-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3648"
},
{
"name": "CVE-2012-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3649"
},
{
"name": "CVE-2012-3687",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3687"
},
{
"name": "CVE-2012-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3712"
},
{
"name": "CVE-2012-2818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2818"
}
],
"initial_release_date": "2012-09-21T00:00:00",
"last_revision_date": "2012-09-21T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5502 du 21 septembre 2012 :",
"url": "http://support.apple.com/kb/HT5502"
}
],
"reference": "CERTA-2012-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSafari 6.0.1\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au moyen de pages\nWeb sp\u00e9cialement con\u00e7ues.\n",
"title": "Multiples Vuln\u00e9rabilit\u00e9s dans Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curi\u00e9 Apple HT5502 du 19 Septembre 2012",
"url": null
}
]
}
CERTA-2012-AVI-295
Vulnerability from certfr_avis - Published: 2012-05-29 - Updated: 2012-05-29
De nombreuses vulnérabilités ont été corrigées dans Google Chrome. Elles permettent à un utilisateur malintentionné d'exécuter du code arbitraire à distance ou de provoquer un arrêt inopiné de l'application en utilisant une page Web spécialement conçue.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Chrome versions antérieures à la version 19.0.1084.52.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eGoogle Chrome versions ant\u00e9rieures \u00e0 la version 19.0.1084.52.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3109",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3109"
},
{
"name": "CVE-2011-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3114"
},
{
"name": "CVE-2011-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3106"
},
{
"name": "CVE-2011-3103",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3103"
},
{
"name": "CVE-2011-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3105"
},
{
"name": "CVE-2011-3107",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3107"
},
{
"name": "CVE-2011-3112",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3112"
},
{
"name": "CVE-2011-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3113"
},
{
"name": "CVE-2011-3110",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3110"
},
{
"name": "CVE-2011-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3108"
},
{
"name": "CVE-2011-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3104"
},
{
"name": "CVE-2011-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3111"
},
{
"name": "CVE-2011-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3115"
}
],
"initial_release_date": "2012-05-29T00:00:00",
"last_revision_date": "2012-05-29T00:00:00",
"links": [
{
"title": "Note de version Google Chrome du 23 mai 2012 :",
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
}
],
"reference": "CERTA-2012-AVI-295",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-05-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Google Chrome. Elles\npermettent \u00e0 un utilisateur malintentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire\n\u00e0 distance ou de provoquer un arr\u00eat inopin\u00e9 de l\u0027application en\nutilisant une page Web sp\u00e9cialement con\u00e7ue.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 23 mai 2012",
"url": null
}
]
}
GHSA-FQQ3-69M6-G84R
Vulnerability from github – Published: 2022-05-17 01:00 – Updated: 2022-05-17 01:00Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.
{
"affected": [],
"aliases": [
"CVE-2011-3105"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-05-24T18:55:00Z",
"severity": "HIGH"
},
"details": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.",
"id": "GHSA-fqq3-69m6-g84r",
"modified": "2022-05-17T01:00:37Z",
"published": "2022-05-17T01:00:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3105"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535"
},
{
"type": "WEB",
"url": "http://code.google.com/p/chromium/issues/detail?id=120912"
},
{
"type": "WEB",
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"type": "WEB",
"url": "http://osvdb.org/82242"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/49277"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/49306"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201205-04.xml"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5485"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5502"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5503"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/53679"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1027098"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-3105
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-3105",
"description": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.",
"id": "GSD-2011-3105",
"references": [
"https://www.suse.com/security/cve/CVE-2011-3105.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-3105"
],
"details": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.",
"id": "GSD-2011-3105",
"modified": "2023-12-13T01:19:09.190408Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3105",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:15535",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535"
},
{
"name": "APPLE-SA-2012-09-19-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "GLSA-201205-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201205-04.xml"
},
{
"name": "http://support.apple.com/kb/HT5485",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5485"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "http://support.apple.com/kb/HT5502",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=120912",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=120912"
},
{
"name": "53679",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53679"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
},
{
"name": "1027098",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027098"
},
{
"name": "82242",
"refsource": "OSVDB",
"url": "http://osvdb.org/82242"
},
{
"name": "APPLE-SA-2012-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name": "49306",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49306"
},
{
"name": "49277",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49277"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1044.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1036.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1041.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1045.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1038.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1037.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1030.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1036.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1028.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1049.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1049.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1055.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1055.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1055.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1058.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1059.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1063.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1063.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1070.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1071.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1077.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1077.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1081.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1082.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1036.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1033.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1034.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1047.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1048.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1052.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1053.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1057.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1057.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1061.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1061.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1066.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1067.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1074.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1075.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1078.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1079.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1036.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1036.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1031.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1032.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1029.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1046.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1050.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1051.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1056.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1056.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1060.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1060.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1064.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1065.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1072.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1073.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1077.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1077.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1082.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1083.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "19.0.1084.51",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1043.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1042.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1040.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1039.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1035.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1036.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1049.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1049.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1054.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1055.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1057.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1058.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1062.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1062.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1068.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1068.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1069.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1076.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1076.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1080.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1081.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:19.0.1084.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3105"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://code.google.com/p/chromium/issues/detail?id=120912",
"refsource": "CONFIRM",
"tags": [],
"url": "http://code.google.com/p/chromium/issues/detail?id=120912"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
},
{
"name": "http://support.apple.com/kb/HT5485",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5485"
},
{
"name": "APPLE-SA-2012-09-12-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name": "APPLE-SA-2012-09-19-3",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5502",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "53679",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/53679"
},
{
"name": "1027098",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1027098"
},
{
"name": "49277",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/49277"
},
{
"name": "GLSA-201205-04",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-201205-04.xml"
},
{
"name": "82242",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/82242"
},
{
"name": "49306",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/49306"
},
{
"name": "oval:org.mitre.oval:def:15535",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-09-19T01:33Z",
"publishedDate": "2012-05-24T18:55Z"
}
}
}
FKIE_CVE-2011-3105
Vulnerability from fkie_nvd - Published: 2012-05-24 18:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://code.google.com/p/chromium/issues/detail?id=120912 | ||
| cve@mitre.org | http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html | Vendor Advisory | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html | ||
| cve@mitre.org | http://osvdb.org/82242 | ||
| cve@mitre.org | http://secunia.com/advisories/49277 | ||
| cve@mitre.org | http://secunia.com/advisories/49306 | ||
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-201205-04.xml | ||
| cve@mitre.org | http://support.apple.com/kb/HT5485 | ||
| cve@mitre.org | http://support.apple.com/kb/HT5502 | ||
| cve@mitre.org | http://support.apple.com/kb/HT5503 | ||
| cve@mitre.org | http://www.securityfocus.com/bid/53679 | ||
| cve@mitre.org | http://www.securitytracker.com/id?1027098 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://code.google.com/p/chromium/issues/detail?id=120912 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/82242 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49277 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49306 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201205-04.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5485 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5502 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5503 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53679 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027098 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535 |
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| chrome | 19.0.1028.0 | ||
| chrome | 19.0.1029.0 | ||
| chrome | 19.0.1030.0 | ||
| chrome | 19.0.1031.0 | ||
| chrome | 19.0.1032.0 | ||
| chrome | 19.0.1033.0 | ||
| chrome | 19.0.1034.0 | ||
| chrome | 19.0.1035.0 | ||
| chrome | 19.0.1036.0 | ||
| chrome | 19.0.1036.2 | ||
| chrome | 19.0.1036.3 | ||
| chrome | 19.0.1036.4 | ||
| chrome | 19.0.1036.6 | ||
| chrome | 19.0.1036.7 | ||
| chrome | 19.0.1037.0 | ||
| chrome | 19.0.1038.0 | ||
| chrome | 19.0.1039.0 | ||
| chrome | 19.0.1040.0 | ||
| chrome | 19.0.1041.0 | ||
| chrome | 19.0.1042.0 | ||
| chrome | 19.0.1043.0 | ||
| chrome | 19.0.1044.0 | ||
| chrome | 19.0.1045.0 | ||
| chrome | 19.0.1046.0 | ||
| chrome | 19.0.1047.0 | ||
| chrome | 19.0.1048.0 | ||
| chrome | 19.0.1049.0 | ||
| chrome | 19.0.1049.1 | ||
| chrome | 19.0.1049.2 | ||
| chrome | 19.0.1049.3 | ||
| chrome | 19.0.1050.0 | ||
| chrome | 19.0.1051.0 | ||
| chrome | 19.0.1052.0 | ||
| chrome | 19.0.1053.0 | ||
| chrome | 19.0.1054.0 | ||
| chrome | 19.0.1055.0 | ||
| chrome | 19.0.1055.1 | ||
| chrome | 19.0.1055.2 | ||
| chrome | 19.0.1055.3 | ||
| chrome | 19.0.1056.0 | ||
| chrome | 19.0.1056.1 | ||
| chrome | 19.0.1057.0 | ||
| chrome | 19.0.1057.1 | ||
| chrome | 19.0.1057.3 | ||
| chrome | 19.0.1058.0 | ||
| chrome | 19.0.1058.1 | ||
| chrome | 19.0.1059.0 | ||
| chrome | 19.0.1060.0 | ||
| chrome | 19.0.1060.1 | ||
| chrome | 19.0.1061.0 | ||
| chrome | 19.0.1061.1 | ||
| chrome | 19.0.1062.0 | ||
| chrome | 19.0.1062.1 | ||
| chrome | 19.0.1063.0 | ||
| chrome | 19.0.1063.1 | ||
| chrome | 19.0.1064.0 | ||
| chrome | 19.0.1065.0 | ||
| chrome | 19.0.1066.0 | ||
| chrome | 19.0.1067.0 | ||
| chrome | 19.0.1068.0 | ||
| chrome | 19.0.1068.1 | ||
| chrome | 19.0.1069.0 | ||
| chrome | 19.0.1070.0 | ||
| chrome | 19.0.1071.0 | ||
| chrome | 19.0.1072.0 | ||
| chrome | 19.0.1073.0 | ||
| chrome | 19.0.1074.0 | ||
| chrome | 19.0.1075.0 | ||
| chrome | 19.0.1076.0 | ||
| chrome | 19.0.1076.1 | ||
| chrome | 19.0.1077.0 | ||
| chrome | 19.0.1077.1 | ||
| chrome | 19.0.1077.2 | ||
| chrome | 19.0.1077.3 | ||
| chrome | 19.0.1078.0 | ||
| chrome | 19.0.1079.0 | ||
| chrome | 19.0.1080.0 | ||
| chrome | 19.0.1081.0 | ||
| chrome | 19.0.1081.2 | ||
| chrome | 19.0.1082.0 | ||
| chrome | 19.0.1082.1 | ||
| chrome | 19.0.1083.0 | ||
| chrome | 19.0.1084.0 | ||
| chrome | 19.0.1084.1 | ||
| chrome | 19.0.1084.2 | ||
| chrome | 19.0.1084.3 | ||
| chrome | 19.0.1084.4 | ||
| chrome | 19.0.1084.5 | ||
| chrome | 19.0.1084.6 | ||
| chrome | 19.0.1084.7 | ||
| chrome | 19.0.1084.8 | ||
| chrome | 19.0.1084.9 | ||
| chrome | 19.0.1084.10 | ||
| chrome | 19.0.1084.11 | ||
| chrome | 19.0.1084.12 | ||
| chrome | 19.0.1084.13 | ||
| chrome | 19.0.1084.14 | ||
| chrome | 19.0.1084.15 | ||
| chrome | 19.0.1084.16 | ||
| chrome | 19.0.1084.17 | ||
| chrome | 19.0.1084.18 | ||
| chrome | 19.0.1084.19 | ||
| chrome | 19.0.1084.20 | ||
| chrome | 19.0.1084.21 | ||
| chrome | 19.0.1084.22 | ||
| chrome | 19.0.1084.23 | ||
| chrome | 19.0.1084.24 | ||
| chrome | 19.0.1084.25 | ||
| chrome | 19.0.1084.26 | ||
| chrome | 19.0.1084.27 | ||
| chrome | 19.0.1084.28 | ||
| chrome | 19.0.1084.29 | ||
| chrome | 19.0.1084.30 | ||
| chrome | 19.0.1084.31 | ||
| chrome | 19.0.1084.32 | ||
| chrome | 19.0.1084.33 | ||
| chrome | 19.0.1084.35 | ||
| chrome | 19.0.1084.36 | ||
| chrome | 19.0.1084.37 | ||
| chrome | 19.0.1084.38 | ||
| chrome | 19.0.1084.39 | ||
| chrome | 19.0.1084.40 | ||
| chrome | 19.0.1084.41 | ||
| chrome | 19.0.1084.42 | ||
| chrome | 19.0.1084.43 | ||
| chrome | 19.0.1084.44 | ||
| chrome | 19.0.1084.45 | ||
| chrome | 19.0.1084.46 | ||
| chrome | 19.0.1084.47 | ||
| chrome | 19.0.1084.48 | ||
| chrome | 19.0.1084.50 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A7452CF-1C54-4FAB-91D3-E0EEA1F10034",
"versionEndIncluding": "19.0.1084.51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1028.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D345594A-F246-4740-940B-ABE66D27A7D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1029.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A07E6C16-000B-438A-A1BE-846532508DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1030.0:*:*:*:*:*:*:*",
"matchCriteriaId": "253E8560-24DA-48C8-8B3D-75659E827BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1031.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14E88B77-FD11-41F6-9C71-7081BD37A5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1032.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF866887-D019-445E-80C3-C3918A847706",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1033.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F59538-4819-4814-913E-60EBD954B665",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1034.0:*:*:*:*:*:*:*",
"matchCriteriaId": "202E537F-82B0-4D58-A4A2-0E85F29D494D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1035.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9873ACC-942D-4007-9983-93819FC16308",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1036.0:*:*:*:*:*:*:*",
"matchCriteriaId": "18E04201-F373-4FE6-9B5C-619F480FCB24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1036.2:*:*:*:*:*:*:*",
"matchCriteriaId": "86483445-5707-4A73-9488-29AC1F3804F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1036.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5A078BFB-C24D-4AF3-A154-F03E879D4C72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1036.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8FE410-21C1-4876-8A9F-17E5D903DE2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1036.6:*:*:*:*:*:*:*",
"matchCriteriaId": "29632E19-C5CD-4D00-AF96-D024CEF08AF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1036.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7E939919-9B88-4C86-B28F-2119F9C27BCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1037.0:*:*:*:*:*:*:*",
"matchCriteriaId": "802CDA1C-F0D9-4871-8CE0-4D188923A91A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1038.0:*:*:*:*:*:*:*",
"matchCriteriaId": "27847E3A-7212-411C-9757-B4217AC63F1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1039.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33A4C597-1B1C-4D9D-9C60-C8EF27B427A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1040.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE07453A-3676-4D86-9915-3C0C77C4D7D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1041.0:*:*:*:*:*:*:*",
"matchCriteriaId": "689B1718-6633-414D-9FD6-E15CB7F16FAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1042.0:*:*:*:*:*:*:*",
"matchCriteriaId": "05684129-8705-4D6C-8AAF-956DDBF6A29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1043.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB53563D-1EBB-4D49-908B-0D5D66076D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1044.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA66200-A85D-4509-B1F8-E0CAFA50AD8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1045.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AFBD6653-7C8C-48BA-A361-81BF21D2E567",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1046.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C37FFD5C-6E80-4029-9707-4009041EEB0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1047.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43B26088-F504-4AB5-B3D1-C4A2AAE238B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1048.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5E315335-B5F2-4AE8-BFFC-66A3070A3F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1049.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E6E06A-0E3A-4022-90AC-B3B9F17D2DC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1049.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10AA4EB3-7052-41D9-B009-BC8C79557F13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1049.2:*:*:*:*:*:*:*",
"matchCriteriaId": "69ED6DAF-206B-4503-8352-6F3C1BBB5116",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1049.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D1088854-ED29-43F3-A648-3F2435D66020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1050.0:*:*:*:*:*:*:*",
"matchCriteriaId": "770FF3E5-0A68-42A5-98EC-B10CA557174C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1051.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D305E1BA-5F0B-4264-85B8-D0A61BB50F0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1052.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3D24E2E2-AA92-4809-A224-630EDCDCCDC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1053.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0822A59E-3503-43A8-B70F-EC211C02033C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1054.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6AC130-4B24-400E-A424-14B197D8DD57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1055.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9E0279-F73E-4A08-BF7D-E65835A3311D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1055.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F77C22-A7B4-41F7-8C1F-0CCAB9F22D1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1055.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A180CDA5-4AFD-424D-B81F-3CB0C1AC1618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1055.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78A22C74-6932-4BD0-AF8E-35C0E842BE92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1056.0:*:*:*:*:*:*:*",
"matchCriteriaId": "181E4446-B821-4AA9-AB4C-DC28A8D2DF32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1056.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E682FC9-B241-4486-9641-4AD2050196B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1057.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1E2479-4608-4341-988B-306299AF7C23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1057.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A3290CF4-917C-41EE-903A-14FD3958A447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1057.3:*:*:*:*:*:*:*",
"matchCriteriaId": "36EFC2E8-191E-4868-8112-4A96B3B18147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1058.0:*:*:*:*:*:*:*",
"matchCriteriaId": "11D394B7-3938-4337-A471-D03FF5FDA0FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1058.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1925EBD0-705D-4C2B-88AE-57CC1F5F1FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1059.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84AAA773-8419-463A-951C-E58348BFADB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1060.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5BC0B4-CAD3-4EC8-9B17-F893735E57B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1060.1:*:*:*:*:*:*:*",
"matchCriteriaId": "44AA2044-5679-4A9D-A32D-0F21760B8CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1061.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0D7499-F391-47A1-9D28-A39FCB3A50B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1061.1:*:*:*:*:*:*:*",
"matchCriteriaId": "841B7B8B-7165-4D46-8EEE-547E72E91888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1062.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4B62A554-931A-490C-B806-371532A5A6E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1062.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB663AE-C6A5-4DB4-B26C-7588FABD4029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1063.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD84F5F5-FFCA-492B-96AA-2C97106A2B46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1063.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB546C1-54D0-4DC7-8A78-3E3C854DCBB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1064.0:*:*:*:*:*:*:*",
"matchCriteriaId": "500270CF-6914-4298-B040-069CCFA31914",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1065.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71C8A66F-B037-4ADD-8A93-3AE5B41CD387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1066.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A04E7B3-4884-4E47-9D87-245C52753481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1067.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1BD315C4-4870-4FB3-A74B-ECC970B1E7B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1068.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8517D935-C310-42D4-8BF2-08B5E7C4ADC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1068.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37884CB4-8A41-4F9A-8B90-DC32F1A9C488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1069.0:*:*:*:*:*:*:*",
"matchCriteriaId": "81D6AF95-44F8-4479-B917-415FAF8462E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1070.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1E81C6-85A1-4C84-96DD-498D1CB37318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1071.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C0686EC9-B4ED-4A27-AEE5-6E3C2381A29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1072.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F45849C-B1D6-476C-9CA9-1D19EFB7D011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1073.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93B75262-08AB-49D8-81DA-23D59C5E4556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1074.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F98FE46E-1944-479C-BD7B-FD7065AE0904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1075.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1AF3028-100D-4920-8BFE-5192B2B0C1C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1076.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4999A6-E13D-4846-AE0A-7823E511A2CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1076.1:*:*:*:*:*:*:*",
"matchCriteriaId": "74685C56-9269-4F0E-B968-5775FB3BE390",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1077.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89556392-4918-4A3F-879B-0B8B7217E093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1077.1:*:*:*:*:*:*:*",
"matchCriteriaId": "041C24A8-1F2A-487F-A49E-5D245A09E332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1077.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7668E735-3169-4B44-9A78-F7FEEEF2AE5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1077.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C7DEF625-2DDF-485A-ADA2-5724BB9F3B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1078.0:*:*:*:*:*:*:*",
"matchCriteriaId": "78B1C21E-CDEF-40C9-83A4-90ACD72CB418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1079.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A5FD60-F37A-477B-8FE1-4AB04059A3B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1080.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DFC5C2-E076-415C-BC4F-44A58FDC036B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1081.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DAB133E0-28C8-460D-BCA5-DE06F049C3BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1081.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A06D75F-5B25-4784-9544-DA890B4AD520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1082.0:*:*:*:*:*:*:*",
"matchCriteriaId": "569E16B9-1B80-457A-86DD-23590A7D1A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1082.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6262A51-9498-421A-9853-150A851CA0A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1083.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C8FBDE65-C454-4A69-A051-60A61729FBF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C9E2B9-1C43-4C88-9367-63416B2E2D96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C9B4167-F14C-4E25-BE6E-5F400E96E0C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.2:*:*:*:*:*:*:*",
"matchCriteriaId": "32EADF03-036C-4049-9A15-425562A1794D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E031FB4B-5154-4CAE-AA2C-8F472625B226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC24C40-62E7-42D2-9C2E-B21E7C377F59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9B166D7C-9313-48E0-8F20-07B504DBC7A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF995F6-C56B-440E-AA7A-6D00E8ADCC82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06ABAB16-3E5D-48E4-ABA5-94DDC3AFD886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7140118D-5E4B-4E8F-8C3C-9E556D4F5A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.9:*:*:*:*:*:*:*",
"matchCriteriaId": "511EE9D2-1827-4057-A03B-84DA19D72BEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B248982E-5314-4497-853C-2B1630C9DA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B92243C6-92ED-4052-95CE-59F431B9EF15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.12:*:*:*:*:*:*:*",
"matchCriteriaId": "7424C75B-633C-4A02-BCA6-8A74CF604AFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.13:*:*:*:*:*:*:*",
"matchCriteriaId": "23759E8C-4AD5-4FCC-9C43-738D3870D60D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.14:*:*:*:*:*:*:*",
"matchCriteriaId": "EE562D59-A5EF-4915-B576-868BD3C59CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.15:*:*:*:*:*:*:*",
"matchCriteriaId": "F134CD80-D6E8-4D50-A290-8F933ED5F9AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.16:*:*:*:*:*:*:*",
"matchCriteriaId": "504AF011-B12D-4F34-80A4-A3C8430D8F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1E196A96-DF13-41AE-A8AE-E424445FAB87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6D86F839-7EC6-46CF-AB09-81AA929922A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.19:*:*:*:*:*:*:*",
"matchCriteriaId": "F911723C-6F26-4816-B9DB-F5BCD6F10D11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DB101BD5-CFF1-4871-810F-4114EB9F731E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.21:*:*:*:*:*:*:*",
"matchCriteriaId": "CC9AD2A2-633E-4F12-A96D-828058D46484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.22:*:*:*:*:*:*:*",
"matchCriteriaId": "63D6B95B-590F-4AE5-9547-79EE937648BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5484D717-FF4B-456B-89D0-42AF8B2DE8F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.24:*:*:*:*:*:*:*",
"matchCriteriaId": "7683FDF1-AD6F-4DCD-B617-409DF716E8DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.25:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB52AD0-150B-414F-ABD7-4845598DEDC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.26:*:*:*:*:*:*:*",
"matchCriteriaId": "84D438D2-6A51-404E-AC8C-8231CCA7591C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4B5F7448-351C-411D-8332-B94D25CA3DA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.28:*:*:*:*:*:*:*",
"matchCriteriaId": "83103EF7-54DF-4EE9-B535-6C0036D8AC70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.29:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D4B46A-F85E-4779-9295-A16363AD9F8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.30:*:*:*:*:*:*:*",
"matchCriteriaId": "3F9ED915-103C-40D0-B456-C1911411EFE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.31:*:*:*:*:*:*:*",
"matchCriteriaId": "11A41924-4699-4307-BE2F-A426A3D7AA8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.32:*:*:*:*:*:*:*",
"matchCriteriaId": "218E0BA8-0DA3-4394-A3B6-01CE7E0B36B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.33:*:*:*:*:*:*:*",
"matchCriteriaId": "78199063-B11B-4CFC-A560-60173A8E6D3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.35:*:*:*:*:*:*:*",
"matchCriteriaId": "D8ED02C6-0275-4DA6-881D-578833054B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.36:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B6B760-A256-43FF-B704-5147AA065658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.37:*:*:*:*:*:*:*",
"matchCriteriaId": "71415CCA-8CAB-4BDA-BB96-AD339A5B2590",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.38:*:*:*:*:*:*:*",
"matchCriteriaId": "BE78A333-5BA8-4E39-ABED-08BBA7E11A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.39:*:*:*:*:*:*:*",
"matchCriteriaId": "BC999AA9-9623-4A93-ADE2-472F5F2E839D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.40:*:*:*:*:*:*:*",
"matchCriteriaId": "E3629CA6-95DF-437C-8731-366778953DE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.41:*:*:*:*:*:*:*",
"matchCriteriaId": "F55F723D-115E-48BB-B09F-C3ECA4AA4D0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.42:*:*:*:*:*:*:*",
"matchCriteriaId": "C85CC685-1FF2-4574-B67A-2A26736FD3E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.43:*:*:*:*:*:*:*",
"matchCriteriaId": "B8BBF2A7-13D7-4EB4-B362-B9B892C1F2BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.44:*:*:*:*:*:*:*",
"matchCriteriaId": "FA8BDFBA-0920-4437-A03B-2185887F483F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.45:*:*:*:*:*:*:*",
"matchCriteriaId": "32A302A3-69DB-4C80-891E-5F7C447D34CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.46:*:*:*:*:*:*:*",
"matchCriteriaId": "08425A7B-D7BC-4EDF-A610-03251C0F67DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.47:*:*:*:*:*:*:*",
"matchCriteriaId": "19151ABB-9EA9-4DB2-A363-8F164732F8FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.48:*:*:*:*:*:*:*",
"matchCriteriaId": "69C87DC5-AFA5-4F97-A79E-5685B38CCDCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:19.0.1084.50:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D9CC3F-E378-4D57-AE1C-6D1D101D0EB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element."
},
{
"lang": "es",
"value": "Vulnerabilidad de error en la gesti\u00f3n de recursos en la implementaci\u00f3n de las Hojas de Estilo en Cascada (CSS) en Google Chrome antes de 19.0.1084.52, permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores relacionados con el pseudo-elemento: first-letter."
}
],
"id": "CVE-2011-3105",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-05-24T18:55:01.043",
"references": [
{
"source": "cve@mitre.org",
"url": "http://code.google.com/p/chromium/issues/detail?id=120912"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/82242"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/49277"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/49306"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-201205-04.xml"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT5485"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT5502"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT5503"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/53679"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1027098"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://code.google.com/p/chromium/issues/detail?id=120912"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/82242"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/49277"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/49306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201205-04.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5502"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5503"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/53679"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1027098"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15535"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.