Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-0640 (GCVE-0-2012-0640)
Vulnerability from cvelistv5 – Published: 2012-03-12 21:00 – Updated: 2024-08-06 18:30
VLAI?
EPSS
Summary
WebKit in Apple Safari before 5.1.4 does not properly implement "From third parties and advertisers" cookie blocking, which makes it easier for remote web servers to track users via a cookie.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:30:53.781Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "48377",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48377"
},
{
"name": "1026785",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1026785"
},
{
"name": "APPLE-SA-2012-03-12-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-03-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "WebKit in Apple Safari before 5.1.4 does not properly implement \"From third parties and advertisers\" cookie blocking, which makes it easier for remote web servers to track users via a cookie."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-01-05T18:57:01.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"name": "48377",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48377"
},
{
"name": "1026785",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1026785"
},
{
"name": "APPLE-SA-2012-03-12-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-0640",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "WebKit in Apple Safari before 5.1.4 does not properly implement \"From third parties and advertisers\" cookie blocking, which makes it easier for remote web servers to track users via a cookie."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "48377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48377"
},
{
"name": "1026785",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026785"
},
{
"name": "APPLE-SA-2012-03-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2012-0640",
"datePublished": "2012-03-12T21:00:00.000Z",
"dateReserved": "2012-01-12T00:00:00.000Z",
"dateUpdated": "2024-08-06T18:30:53.781Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2012-AVI-141
Vulnerability from certfr_avis - Published: 2012-03-14 - Updated: 2012-03-14
De très nombreuses vulnérabilités ont été corrigées dans Safari, pour de nombreux impacts dont l'exécution de code arbitraire à distance.
Description
De très nombreuses vulnérabilités ont été corrigées dans le navigateur Safari :
- de multiples problèmes de corruption mémoire permettent à un attaquant d'exécuter du code arbitraire sur le client à l'aide de pages Web spécialement conçues ;
- l'affichage des caractères dans la barre d'adresse permet de tromper un utilisateur sur l'identité du site qu'il visite ;
- certaines informations sur l'historique des pages visitées sont enregistrées même quand l'option 'Navigation privée' est activée ;
- plusieurs vulnérabilités permettent une injection de code indirecte à distance;
- des cookies peuvent être révélés à un site illégitime.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Safari pour Mac OS et Windows versions antérieures à 5.1.4.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eSafari pour Mac OS et Windows versions ant\u00e9rieures \u00e0 5.1.4.\u003c/p\u003e",
"content": "## Description\n\nDe tr\u00e8s nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le navigateur\nSafari :\n\n- de multiples probl\u00e8mes de corruption m\u00e9moire permettent \u00e0 un\n attaquant d\u0027ex\u00e9cuter du code arbitraire sur le client \u00e0 l\u0027aide de\n pages Web sp\u00e9cialement con\u00e7ues ;\n- l\u0027affichage des caract\u00e8res dans la barre d\u0027adresse permet de tromper\n un utilisateur sur l\u0027identit\u00e9 du site qu\u0027il visite ;\n- certaines informations sur l\u0027historique des pages visit\u00e9es sont\n enregistr\u00e9es m\u00eame quand l\u0027option \u0027Navigation priv\u00e9e\u0027 est activ\u00e9e ;\n- plusieurs vuln\u00e9rabilit\u00e9s permettent une injection de code indirecte\n \u00e0 distance;\n- des cookies peuvent \u00eatre r\u00e9v\u00e9l\u00e9s \u00e0 un site ill\u00e9gitime.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0602"
},
{
"name": "CVE-2012-0589",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0589"
},
{
"name": "CVE-2012-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0597"
},
{
"name": "CVE-2011-2860",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2860"
},
{
"name": "CVE-2011-2855",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2855"
},
{
"name": "CVE-2012-0628",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0628"
},
{
"name": "CVE-2012-0623",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0623"
},
{
"name": "CVE-2012-0588",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0588"
},
{
"name": "CVE-2012-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0607"
},
{
"name": "CVE-2011-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2867"
},
{
"name": "CVE-2012-0640",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0640"
},
{
"name": "CVE-2012-0613",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0613"
},
{
"name": "CVE-2011-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2847"
},
{
"name": "CVE-2012-0630",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0630"
},
{
"name": "CVE-2011-2866",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2866"
},
{
"name": "CVE-2012-0587",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0587"
},
{
"name": "CVE-2011-2825",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2825"
},
{
"name": "CVE-2012-0586",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0586"
},
{
"name": "CVE-2011-2846",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2846"
},
{
"name": "CVE-2012-0608",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0608"
},
{
"name": "CVE-2012-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0590"
},
{
"name": "CVE-2012-0606",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0606"
},
{
"name": "CVE-2012-0633",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0633"
},
{
"name": "CVE-2011-3885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3885"
},
{
"name": "CVE-2012-0595",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0595"
},
{
"name": "CVE-2012-0596",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0596"
},
{
"name": "CVE-2012-0627",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0627"
},
{
"name": "CVE-2012-0626",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0626"
},
{
"name": "CVE-2012-0593",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0593"
},
{
"name": "CVE-2012-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0617"
},
{
"name": "CVE-2012-0592",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0592"
},
{
"name": "CVE-2011-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2873"
},
{
"name": "CVE-2012-0585",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0585"
},
{
"name": "CVE-2012-0611",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0611"
},
{
"name": "CVE-2012-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0612"
},
{
"name": "CVE-2012-0599",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0599"
},
{
"name": "CVE-2012-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0601"
},
{
"name": "CVE-2011-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3928"
},
{
"name": "CVE-2012-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0614"
},
{
"name": "CVE-2012-0616",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0616"
},
{
"name": "CVE-2012-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0609"
},
{
"name": "CVE-2012-0621",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0621"
},
{
"name": "CVE-2012-0631",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0631"
},
{
"name": "CVE-2012-0600",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0600"
},
{
"name": "CVE-2011-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2857"
},
{
"name": "CVE-2012-0584",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0584"
},
{
"name": "CVE-2011-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2868"
},
{
"name": "CVE-2011-3909",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3909"
},
{
"name": "CVE-2012-0618",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0618"
},
{
"name": "CVE-2012-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0622"
},
{
"name": "CVE-2011-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2869"
},
{
"name": "CVE-2012-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0624"
},
{
"name": "CVE-2012-0604",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0604"
},
{
"name": "CVE-2012-0620",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0620"
},
{
"name": "CVE-2012-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0603"
},
{
"name": "CVE-2011-3888",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3888"
},
{
"name": "CVE-2012-0647",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0647"
},
{
"name": "CVE-2012-0637",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0637"
},
{
"name": "CVE-2012-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0629"
},
{
"name": "CVE-2011-2854",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2854"
},
{
"name": "CVE-2012-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0610"
},
{
"name": "CVE-2012-0648",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0648"
},
{
"name": "CVE-2012-0632",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0632"
},
{
"name": "CVE-2012-0619",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0619"
},
{
"name": "CVE-2011-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2870"
},
{
"name": "CVE-2011-2833",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2833"
},
{
"name": "CVE-2012-0594",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0594"
},
{
"name": "CVE-2011-3908",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3908"
},
{
"name": "CVE-2012-0625",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0625"
},
{
"name": "CVE-2012-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0605"
},
{
"name": "CVE-2011-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2871"
},
{
"name": "CVE-2012-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0635"
},
{
"name": "CVE-2012-0615",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0615"
},
{
"name": "CVE-2012-0636",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0636"
},
{
"name": "CVE-2012-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0591"
},
{
"name": "CVE-2012-0639",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0639"
},
{
"name": "CVE-2011-3897",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3897"
},
{
"name": "CVE-2012-0598",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0598"
},
{
"name": "CVE-2011-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2877"
},
{
"name": "CVE-2011-2872",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2872"
},
{
"name": "CVE-2012-0638",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0638"
},
{
"name": "CVE-2011-3887",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3887"
},
{
"name": "CVE-2011-3881",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3881"
}
],
"initial_release_date": "2012-03-14T00:00:00",
"last_revision_date": "2012-03-14T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-141",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De tr\u00e8s nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Safari, pour de\nnombreux impacts dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5190 du 12 mars 2012",
"url": "http://support.apple.com/kb/HT5190"
}
]
}
GHSA-6MG5-5FX9-QM5J
Vulnerability from github – Published: 2022-05-14 03:52 – Updated: 2022-05-14 03:52
VLAI?
Details
WebKit in Apple Safari before 5.1.4 does not properly implement "From third parties and advertisers" cookie blocking, which makes it easier for remote web servers to track users via a cookie.
{
"affected": [],
"aliases": [
"CVE-2012-0640"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-03-12T21:55:00Z",
"severity": "MODERATE"
},
"details": "WebKit in Apple Safari before 5.1.4 does not properly implement \"From third parties and advertisers\" cookie blocking, which makes it easier for remote web servers to track users via a cookie.",
"id": "GHSA-6mg5-5fx9-qm5j",
"modified": "2022-05-14T03:52:54Z",
"published": "2022-05-14T03:52:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0640"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48377"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1026785"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2012-0640
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
WebKit in Apple Safari before 5.1.4 does not properly implement "From third parties and advertisers" cookie blocking, which makes it easier for remote web servers to track users via a cookie.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2012-0640",
"description": "WebKit in Apple Safari before 5.1.4 does not properly implement \"From third parties and advertisers\" cookie blocking, which makes it easier for remote web servers to track users via a cookie.",
"id": "GSD-2012-0640"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-0640"
],
"details": "WebKit in Apple Safari before 5.1.4 does not properly implement \"From third parties and advertisers\" cookie blocking, which makes it easier for remote web servers to track users via a cookie.",
"id": "GSD-2012-0640",
"modified": "2023-12-13T01:20:13.808756Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-0640",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "WebKit in Apple Safari before 5.1.4 does not properly implement \"From third parties and advertisers\" cookie blocking, which makes it easier for remote web servers to track users via a cookie."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "48377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48377"
},
{
"name": "1026785",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026785"
},
{
"name": "APPLE-SA-2012-03-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.1.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-0640"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "WebKit in Apple Safari before 5.1.4 does not properly implement \"From third parties and advertisers\" cookie blocking, which makes it easier for remote web servers to track users via a cookie."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "APPLE-SA-2012-03-12-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"name": "1026785",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1026785"
},
{
"name": "48377",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48377"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-01-06T02:29Z",
"publishedDate": "2012-03-12T21:55Z"
}
}
}
FKIE_CVE-2012-0640
Vulnerability from fkie_nvd - Published: 2012-03-12 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
WebKit in Apple Safari before 5.1.4 does not properly implement "From third parties and advertisers" cookie blocking, which makes it easier for remote web servers to track users via a cookie.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "971B5375-76F8-404C-80EF-39282F8FCC30",
"versionEndIncluding": "5.1.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A419AE8-F5A2-4E25-9004-AAAB325E201A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "64FE1AA1-32D1-4825-8B2B-E66093937D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E760CD65-A10E-44F1-B835-DA6B77057C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30663B7F-3EDA-4B6B-9F39-65E2CEEB4543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"matchCriteriaId": "91A09DA0-83E9-491D-A0A5-AF97B5463D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"matchCriteriaId": "D91C7EF0-A56B-40E6-9CED-1228405D034E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE6078B0-4756-4E04-BAC4-C4EC90548A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B5A3F2-70EE-4ECD-AD6A-0A72D9EBC755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C87EDB53-FB6E-4B10-B890-A7195D841C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"matchCriteriaId": "957FCFC4-565A-4F2F-8D3D-D0982E1723F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"matchCriteriaId": "22A450DC-CDF5-4EA0-A703-AFB3DEFE1395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*",
"matchCriteriaId": "C1AFF940-B682-4191-9FE9-41910EC9E701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "857C92E2-6870-409A-9457-75F8C5C7B959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD75A4F-F529-4F5E-957D-380215F7B21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "834EC299-2010-4306-8CEE-35D735583101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "443FF271-A3AB-4659-80B2-89F771BF5371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D29B98E-2F62-4F6F-976D-FEC4EB07F106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3112AFEB-7893-467C-8B45-A44D5697BB79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC83309-3A97-4619-B5C1-574610838BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "891514D5-50C8-4EDC-81C5-24ABF8BCC022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "25032A3A-9D05-4E69-9A22-C9B332976769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AF75A31C-FE42-4CB4-A0E6-0CAB7B122483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4EDD80AB-2A6C-47FF-A1E9-DEB273C6B4E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAC0DC3-7B55-49BC-89BC-C588E6FC6828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9315ADD-5B97-4639-9B59-806EFD7BC247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DD81AB-27D6-4CB0-BBF0-5710DAD55A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"matchCriteriaId": "21BAC0B8-063C-4772-8F1B-EB9A2F7A585C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"matchCriteriaId": "6BAB4071-A883-4E04-BDDF-A121C4738E61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E44913D-BC8B-4AA1-84EB-EFEAC531B475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D3889ED-9329-4C84-A173-2553BEAE3EDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B74019F-C365-4E13-BBB4-D84AD9C1F87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E57D5-A7C9-4985-8CE4-E0D4B8BBF371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "06494FA8-F12A-435A-97A4-F38C58DF43F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D1BB047B-D45E-4695-AAEB-D0830DB1663E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"matchCriteriaId": "018A7A39-2AFD-47A9-AE88-7ABDBFE5EDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"matchCriteriaId": "1082B33F-33B5-453A-A5AA-10F65AB2E625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"matchCriteriaId": "6CF4DB54-AA7E-44C3-83E3-1A8971719D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"matchCriteriaId": "EC348464-F08D-4ABF-BB90-3FA93C786F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDCF83E-620C-40FA-9901-5D939E315143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"matchCriteriaId": "73B23547-9710-44E9-A32A-6320C8E7A780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"matchCriteriaId": "E3BAE980-449F-4F8C-A5BC-6CB7226E971A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A33F900-D405-40A8-A0A5-3C80320FF6E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4444A309-5A97-4E1C-B4EA-C4A070A98CBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*",
"matchCriteriaId": "29C67ABC-DD90-4989-9C20-80F7350CAA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "5B29951B-9A98-45B7-8E4B-5515C048EC52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*",
"matchCriteriaId": "904AB10E-9615-4EE7-ACDD-7D94F3CD8781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8CEB23DE-1A9D-480E-8B8B-9F110A8ABDE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*",
"matchCriteriaId": "430E6664-DA03-41D5-A0F6-588DAE4E00C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "4CED950D-38AB-4D66-B97A-FB982D86057F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D0FDEB4F-133A-43DF-A89B-53E249F1293D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*",
"matchCriteriaId": "407625EE-A7CC-47A5-83D6-8DA974680BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "84E78F43-07BD-4D62-9512-DA738A92BC7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"matchCriteriaId": "9270F5C4-63B9-48C5-9D6D-9CDA1461205C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "4AE25E9E-826E-4782-AED8-AC6297B18D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*",
"matchCriteriaId": "2D7BE861-EA7E-4CDC-BEAA-3942771CF0CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F3180366-2240-467E-8AB9-BEA0430948F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"matchCriteriaId": "FD35EC3D-01E2-4FA7-95AC-A2E57C652649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "B5E834B8-545E-4472-9D60-B4CF1340D62C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*",
"matchCriteriaId": "F8DFCDF9-7481-4C7F-9CD7-4C2ECD5381A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5AB9CC52-E533-4306-9E92-73C84B264D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"matchCriteriaId": "C23C022E-293E-4247-A9AD-2F27C29E92A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "14A5CA99-8B1C-4C35-85E3-DB0495444A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*",
"matchCriteriaId": "807A90BE-578B-44AA-842F-32DF7CA1C40A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01D8C2EF-D552-4279-A12E-70E292F39E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*",
"matchCriteriaId": "7033FB61-BE7D-4F00-BFBC-2E7B681D1876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "C00082E3-EBF5-4C23-9F57-BF73E587FC05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*",
"matchCriteriaId": "ECD1658B-4B65-4F79-A5D2-AC13AC20C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C453B588-15FD-4A9C-8BC1-6202A21DAE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*",
"matchCriteriaId": "B100C584-EF2E-4F89-AE23-23C2D6B48DED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "460A6F14-7CCE-47CA-BE0C-6DF32CD6A8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*",
"matchCriteriaId": "7A6DB3B7-3DFB-4AB5-916C-D30B4ED4F719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15BB6761-3581-4AE6-85E0-1609D15D7618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*",
"matchCriteriaId": "8CAA4D33-5295-4A30-BF53-D15C6907FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA1A4C8-9F87-449F-A11F-52E5D52247E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*",
"matchCriteriaId": "244A0076-4452-4A8A-8013-6B77DF914CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8498D2-DECC-4B88-BC1B-F8E2D076EE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*",
"matchCriteriaId": "FA5C6BE7-12DE-4BB6-B93B-9481DEABBFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BDA6DB4-A0DA-43CA-AABD-10EEEEB28EAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "9DC87F61-3463-468A-BF0B-070816BBC3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "02EAC196-AE43-4787-9AF9-E79E2E1BBA46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FD40E4-D4C9-492E-8432-ABC9BD2C7E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "36EA71E0-63F7-46FF-AF11-792741F27628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80E36485-565D-4FAA-A6AD-57DF42D47462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73E9C17F-C99E-4ABB-B312-31F87BC0C0E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "46D8318A-9383-42A7-9A6A-2EB2736338B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79DC6C51-CEEA-4CBF-87D2-8007B7C3D67F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B6AD89-D60C-4C8F-A9E6-4380A6B8DB13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B2451165-7831-426E-BA07-B3A57F3589C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "410E58BC-72AF-4695-8022-A08913077BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DE630BC-7E63-40DF-BB8B-327513F5DBAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BD80CA73-5612-4799-9084-09BAA7938F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "17A3218C-F9D1-486C-A101-86B76BD70CCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BB498BFC-82E2-4E13-8B4E-A84D2651DC8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0E95A471-98E8-4091-BFA1-BBB6AF8A6C56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B5764306-1C4A-42BF-A975-998459373DF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C919E920-1ED2-4409-8A67-AD2766A25CAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "76C1EA50-BE9C-4A5D-8A5B-CCEDBD1548A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WebKit in Apple Safari before 5.1.4 does not properly implement \"From third parties and advertisers\" cookie blocking, which makes it easier for remote web servers to track users via a cookie."
},
{
"lang": "es",
"value": "WebKit de Apple Safari anteriores a 5.1.4 no implementa apropiadamente el bloqueo de cookies \"de terceras partes y anunciantes\", lo que facilita a servidores web remotos realizar un segumiento del usuario a trav\u00e9s de una cookie."
}
],
"id": "CVE-2012-0640",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-03-12T21:55:00.933",
"references": [
{
"source": "product-security@apple.com",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"source": "product-security@apple.com",
"url": "http://secunia.com/advisories/48377"
},
{
"source": "product-security@apple.com",
"url": "http://www.securitytracker.com/id?1026785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1026785"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…