Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-3713 (GCVE-0-2012-3713)
Vulnerability from cvelistv5 – Published: 2012-09-20 21:00 – Updated: 2024-08-06 20:13
VLAI?
EPSS
Summary
Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:13:51.730Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "APPLE-SA-2012-09-19-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "85652",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/85652"
},
{
"name": "55624",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/55624"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "apple-safari-cve20123713(78679)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78679"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-09-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"name": "APPLE-SA-2012-09-19-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "85652",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/85652"
},
{
"name": "55624",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/55624"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "apple-safari-cve20123713(78679)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78679"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-3713",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "APPLE-SA-2012-09-19-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "85652",
"refsource": "OSVDB",
"url": "http://osvdb.org/85652"
},
{
"name": "55624",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55624"
},
{
"name": "http://support.apple.com/kb/HT5502",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "apple-safari-cve20123713(78679)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78679"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2012-3713",
"datePublished": "2012-09-20T21:00:00.000Z",
"dateReserved": "2012-06-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T20:13:51.730Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GSD-2012-3713
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2012-3713",
"description": "Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.",
"id": "GSD-2012-3713"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-3713"
],
"details": "Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.",
"id": "GSD-2012-3713",
"modified": "2023-12-13T01:20:20.642035Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-3713",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "APPLE-SA-2012-09-19-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "85652",
"refsource": "OSVDB",
"url": "http://osvdb.org/85652"
},
{
"name": "55624",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55624"
},
{
"name": "http://support.apple.com/kb/HT5502",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "apple-safari-cve20123713(78679)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78679"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-3713"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT5502",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "APPLE-SA-2012-09-19-3",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "55624",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/55624"
},
{
"name": "85652",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/85652"
},
{
"name": "apple-safari-cve20123713(78679)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78679"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-08-29T01:32Z",
"publishedDate": "2012-09-20T21:55Z"
}
}
}
JVNDB-2012-000088
Vulnerability from jvndb - Published: 2012-10-23 14:57 - Updated:2012-10-23 14:57Summary
Safari vulnerable to local file content disclosure
Details
Safari contains a vulnerability where a local file may be accessed from remote, which may result in a local file content disclosure.
Masahiro YAMADA reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000088.html",
"dc:date": "2012-10-23T14:57+09:00",
"dcterms:issued": "2012-10-23T14:57+09:00",
"dcterms:modified": "2012-10-23T14:57+09:00",
"description": "Safari contains a vulnerability where a local file may be accessed from remote, which may result in a local file content disclosure.\r\n\r\nMasahiro YAMADA reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000088.html",
"sec:cpe": {
"#text": "cpe:/a:apple:safari",
"@product": "Safari",
"@vendor": "Apple Inc.",
"@version": "2.2"
},
"sec:cvss": {
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2012-000088",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN42676559/index.html",
"@id": "JVN#42676559",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3713",
"@id": "CVE-2012-3713",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3713",
"@id": "CVE-2012-3713",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-264",
"@title": "Permissions(CWE-264)"
}
],
"title": "Safari vulnerable to local file content disclosure"
}
GHSA-F9PM-2GC4-V2G5
Vulnerability from github – Published: 2022-05-17 01:43 – Updated: 2022-05-17 01:43
VLAI?
Details
Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.
{
"affected": [],
"aliases": [
"CVE-2012-3713"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-09-20T21:55:00Z",
"severity": "MODERATE"
},
"details": "Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.",
"id": "GHSA-f9pm-2gc4-v2g5",
"modified": "2022-05-17T01:43:38Z",
"published": "2022-05-17T01:43:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3713"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78679"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"type": "WEB",
"url": "http://osvdb.org/85652"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5502"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/55624"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2012-AVI-513
Vulnerability from certfr_avis - Published: 2012-09-21 - Updated: 2012-09-21
De multiples vulnérabilités ont été corrigées dans Safari 6.0.1. Certaines d'entre elles permettent à un attaquant d'exécuter du code arbitraire à distance au moyen de pages Web spécialement conçues.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à Safari 6.0.1.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 Safari 6.0.1.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3623"
},
{
"name": "CVE-2012-3622",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3622"
},
{
"name": "CVE-2012-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3651"
},
{
"name": "CVE-2012-3699",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3699"
},
{
"name": "CVE-2012-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3658"
},
{
"name": "CVE-2012-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3598"
},
{
"name": "CVE-2012-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3607"
},
{
"name": "CVE-2012-3713",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3713"
},
{
"name": "CVE-2012-3624",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3624"
},
{
"name": "CVE-2012-2831",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2831"
},
{
"name": "CVE-2012-3675",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3675"
},
{
"name": "CVE-2012-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3657"
},
{
"name": "CVE-2012-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3652"
},
{
"name": "CVE-2012-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3643"
},
{
"name": "CVE-2012-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3688"
},
{
"name": "CVE-2012-3701",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3701"
},
{
"name": "CVE-2012-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3617"
},
{
"name": "CVE-2012-3676",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3676"
},
{
"name": "CVE-2012-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3602"
},
{
"name": "CVE-2012-2843",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2843"
},
{
"name": "CVE-2012-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3614"
},
{
"name": "CVE-2012-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3705"
},
{
"name": "CVE-2012-3654",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3654"
},
{
"name": "CVE-2011-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3105"
},
{
"name": "CVE-2012-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2829"
},
{
"name": "CVE-2012-3685",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3685"
},
{
"name": "CVE-2012-3692",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3692"
},
{
"name": "CVE-2012-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3647"
},
{
"name": "CVE-2012-3684",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3684"
},
{
"name": "CVE-2012-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3677"
},
{
"name": "CVE-2012-3671",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3671"
},
{
"name": "CVE-2012-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3606"
},
{
"name": "CVE-2012-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3709"
},
{
"name": "CVE-2012-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3715"
},
{
"name": "CVE-2012-3673",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3673"
},
{
"name": "CVE-2012-2842",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2842"
},
{
"name": "CVE-2012-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3613"
},
{
"name": "CVE-2012-3700",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3700"
},
{
"name": "CVE-2012-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3659"
},
{
"name": "CVE-2012-3708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3708"
},
{
"name": "CVE-2012-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3616"
},
{
"name": "CVE-2012-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3714"
},
{
"name": "CVE-2012-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3710"
},
{
"name": "CVE-2012-3601",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3601"
},
{
"name": "CVE-2012-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3612"
},
{
"name": "CVE-2012-3704",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3704"
},
{
"name": "CVE-2012-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3632"
},
{
"name": "CVE-2012-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2817"
},
{
"name": "CVE-2012-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3672"
},
{
"name": "CVE-2012-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3660"
},
{
"name": "CVE-2012-3706",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3706"
},
{
"name": "CVE-2012-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3707"
},
{
"name": "CVE-2012-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3702"
},
{
"name": "CVE-2012-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3621"
},
{
"name": "CVE-2012-3703",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3703"
},
{
"name": "CVE-2012-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3711"
},
{
"name": "CVE-2012-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3648"
},
{
"name": "CVE-2012-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3649"
},
{
"name": "CVE-2012-3687",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3687"
},
{
"name": "CVE-2012-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3712"
},
{
"name": "CVE-2012-2818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2818"
}
],
"initial_release_date": "2012-09-21T00:00:00",
"last_revision_date": "2012-09-21T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5502 du 21 septembre 2012 :",
"url": "http://support.apple.com/kb/HT5502"
}
],
"reference": "CERTA-2012-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSafari 6.0.1\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au moyen de pages\nWeb sp\u00e9cialement con\u00e7ues.\n",
"title": "Multiples Vuln\u00e9rabilit\u00e9s dans Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curi\u00e9 Apple HT5502 du 19 Septembre 2012",
"url": null
}
]
}
FKIE_CVE-2012-3713
Vulnerability from fkie_nvd - Published: 2012-09-20 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE370CAA-04B3-434E-BD5B-1D87DE596C10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6D8D60-6144-4FE4-90E9-CD12D648AEA1",
"versionEndIncluding": "6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A419AE8-F5A2-4E25-9004-AAAB325E201A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "64FE1AA1-32D1-4825-8B2B-E66093937D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E760CD65-A10E-44F1-B835-DA6B77057C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30663B7F-3EDA-4B6B-9F39-65E2CEEB4543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"matchCriteriaId": "91A09DA0-83E9-491D-A0A5-AF97B5463D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"matchCriteriaId": "D91C7EF0-A56B-40E6-9CED-1228405D034E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE6078B0-4756-4E04-BAC4-C4EC90548A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B5A3F2-70EE-4ECD-AD6A-0A72D9EBC755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C87EDB53-FB6E-4B10-B890-A7195D841C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"matchCriteriaId": "957FCFC4-565A-4F2F-8D3D-D0982E1723F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"matchCriteriaId": "22A450DC-CDF5-4EA0-A703-AFB3DEFE1395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*",
"matchCriteriaId": "C1AFF940-B682-4191-9FE9-41910EC9E701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "857C92E2-6870-409A-9457-75F8C5C7B959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD75A4F-F529-4F5E-957D-380215F7B21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "834EC299-2010-4306-8CEE-35D735583101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "443FF271-A3AB-4659-80B2-89F771BF5371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D29B98E-2F62-4F6F-976D-FEC4EB07F106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3112AFEB-7893-467C-8B45-A44D5697BB79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC83309-3A97-4619-B5C1-574610838BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "891514D5-50C8-4EDC-81C5-24ABF8BCC022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "25032A3A-9D05-4E69-9A22-C9B332976769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AF75A31C-FE42-4CB4-A0E6-0CAB7B122483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4EDD80AB-2A6C-47FF-A1E9-DEB273C6B4E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAC0DC3-7B55-49BC-89BC-C588E6FC6828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9315ADD-5B97-4639-9B59-806EFD7BC247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DD81AB-27D6-4CB0-BBF0-5710DAD55A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"matchCriteriaId": "21BAC0B8-063C-4772-8F1B-EB9A2F7A585C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"matchCriteriaId": "6BAB4071-A883-4E04-BDDF-A121C4738E61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E44913D-BC8B-4AA1-84EB-EFEAC531B475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D3889ED-9329-4C84-A173-2553BEAE3EDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B74019F-C365-4E13-BBB4-D84AD9C1F87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E57D5-A7C9-4985-8CE4-E0D4B8BBF371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "06494FA8-F12A-435A-97A4-F38C58DF43F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D1BB047B-D45E-4695-AAEB-D0830DB1663E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"matchCriteriaId": "018A7A39-2AFD-47A9-AE88-7ABDBFE5EDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"matchCriteriaId": "1082B33F-33B5-453A-A5AA-10F65AB2E625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"matchCriteriaId": "6CF4DB54-AA7E-44C3-83E3-1A8971719D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"matchCriteriaId": "EC348464-F08D-4ABF-BB90-3FA93C786F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDCF83E-620C-40FA-9901-5D939E315143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"matchCriteriaId": "73B23547-9710-44E9-A32A-6320C8E7A780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"matchCriteriaId": "E3BAE980-449F-4F8C-A5BC-6CB7226E971A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A33F900-D405-40A8-A0A5-3C80320FF6E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4444A309-5A97-4E1C-B4EA-C4A070A98CBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*",
"matchCriteriaId": "29C67ABC-DD90-4989-9C20-80F7350CAA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "5B29951B-9A98-45B7-8E4B-5515C048EC52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*",
"matchCriteriaId": "904AB10E-9615-4EE7-ACDD-7D94F3CD8781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8CEB23DE-1A9D-480E-8B8B-9F110A8ABDE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*",
"matchCriteriaId": "430E6664-DA03-41D5-A0F6-588DAE4E00C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "4CED950D-38AB-4D66-B97A-FB982D86057F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D0FDEB4F-133A-43DF-A89B-53E249F1293D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*",
"matchCriteriaId": "407625EE-A7CC-47A5-83D6-8DA974680BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "84E78F43-07BD-4D62-9512-DA738A92BC7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"matchCriteriaId": "9270F5C4-63B9-48C5-9D6D-9CDA1461205C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "4AE25E9E-826E-4782-AED8-AC6297B18D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*",
"matchCriteriaId": "2D7BE861-EA7E-4CDC-BEAA-3942771CF0CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F3180366-2240-467E-8AB9-BEA0430948F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"matchCriteriaId": "FD35EC3D-01E2-4FA7-95AC-A2E57C652649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "B5E834B8-545E-4472-9D60-B4CF1340D62C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*",
"matchCriteriaId": "F8DFCDF9-7481-4C7F-9CD7-4C2ECD5381A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5AB9CC52-E533-4306-9E92-73C84B264D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"matchCriteriaId": "C23C022E-293E-4247-A9AD-2F27C29E92A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "14A5CA99-8B1C-4C35-85E3-DB0495444A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*",
"matchCriteriaId": "807A90BE-578B-44AA-842F-32DF7CA1C40A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01D8C2EF-D552-4279-A12E-70E292F39E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*",
"matchCriteriaId": "7033FB61-BE7D-4F00-BFBC-2E7B681D1876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "C00082E3-EBF5-4C23-9F57-BF73E587FC05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*",
"matchCriteriaId": "ECD1658B-4B65-4F79-A5D2-AC13AC20C4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C453B588-15FD-4A9C-8BC1-6202A21DAE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*",
"matchCriteriaId": "B100C584-EF2E-4F89-AE23-23C2D6B48DED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "460A6F14-7CCE-47CA-BE0C-6DF32CD6A8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*",
"matchCriteriaId": "7A6DB3B7-3DFB-4AB5-916C-D30B4ED4F719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15BB6761-3581-4AE6-85E0-1609D15D7618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*",
"matchCriteriaId": "8CAA4D33-5295-4A30-BF53-D15C6907FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA1A4C8-9F87-449F-A11F-52E5D52247E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*",
"matchCriteriaId": "244A0076-4452-4A8A-8013-6B77DF914CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8498D2-DECC-4B88-BC1B-F8E2D076EE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*",
"matchCriteriaId": "FA5C6BE7-12DE-4BB6-B93B-9481DEABBFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BDA6DB4-A0DA-43CA-AABD-10EEEEB28EAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "9DC87F61-3463-468A-BF0B-070816BBC3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "02EAC196-AE43-4787-9AF9-E79E2E1BBA46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FD40E4-D4C9-492E-8432-ABC9BD2C7E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "36EA71E0-63F7-46FF-AF11-792741F27628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80E36485-565D-4FAA-A6AD-57DF42D47462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73E9C17F-C99E-4ABB-B312-31F87BC0C0E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "46D8318A-9383-42A7-9A6A-2EB2736338B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79DC6C51-CEEA-4CBF-87D2-8007B7C3D67F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B6AD89-D60C-4C8F-A9E6-4380A6B8DB13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B2451165-7831-426E-BA07-B3A57F3589C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "410E58BC-72AF-4695-8022-A08913077BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DE630BC-7E63-40DF-BB8B-327513F5DBAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BD80CA73-5612-4799-9084-09BAA7938F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "17A3218C-F9D1-486C-A101-86B76BD70CCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BB498BFC-82E2-4E13-8B4E-A84D2651DC8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0E95A471-98E8-4091-BFA1-BBB6AF8A6C56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B5764306-1C4A-42BF-A975-998459373DF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C919E920-1ED2-4409-8A67-AD2766A25CAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "76C1EA50-BE9C-4A5D-8A5B-CCEDBD1548A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "00B2910C-8592-4B38-9CA3-23B7719AB06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "727C6A42-2CD2-471C-BD94-C6BDA91F2B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8E61D3D6-12EA-4B1C-849E-C99F44586294",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD4C506-3330-48E2-82BD-8745A8564F8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A7330C-EA91-49E7-BE21-A73B9ED8D499",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document."
},
{
"lang": "es",
"value": "Apple Safari anterior a v6.0.1 no maneja adecuadamente el atributo Quarantine de los documentos HTML, lo que permite a atacantes remotos asistidos por el usuario leer archivos de su elecci\u00f3n aprovechando la presencia de un documento descargado."
}
],
"id": "CVE-2012-3713",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-09-20T21:55:02.483",
"references": [
{
"source": "product-security@apple.com",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"source": "product-security@apple.com",
"url": "http://osvdb.org/85652"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT5502"
},
{
"source": "product-security@apple.com",
"url": "http://www.securityfocus.com/bid/55624"
},
{
"source": "product-security@apple.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78679"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/85652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT5502"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/55624"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78679"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…