Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-2857 (GCVE-0-2012-2857)
Vulnerability from cvelistv5 – Published: 2012-08-06 15:00 – Updated: 2024-08-06 19:50- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:50:03.676Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=136235"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5642"
},
{
"name": "oval:org.mitre.oval:def:15336",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336"
},
{
"name": "APPLE-SA-2013-03-14-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
},
{
"name": "APPLE-SA-2013-01-28-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-07-31T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=136235"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5642"
},
{
"name": "oval:org.mitre.oval:def:15336",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336"
},
{
"name": "APPLE-SA-2013-03-14-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
},
{
"name": "APPLE-SA-2013-01-28-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2012-2857",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://code.google.com/p/chromium/issues/detail?id=136235",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=136235"
},
{
"name": "http://support.apple.com/kb/HT5642",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5642"
},
{
"name": "oval:org.mitre.oval:def:15336",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336"
},
{
"name": "APPLE-SA-2013-03-14-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
},
{
"name": "APPLE-SA-2013-01-28-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2012-2857",
"datePublished": "2012-08-06T15:00:00.000Z",
"dateReserved": "2012-05-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T19:50:03.676Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GSD-2012-2857
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-2857",
"description": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.",
"id": "GSD-2012-2857"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-2857"
],
"details": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.",
"id": "GSD-2012-2857",
"modified": "2023-12-13T01:20:16.677388Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2012-2857",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://code.google.com/p/chromium/issues/detail?id=136235",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=136235"
},
{
"name": "http://support.apple.com/kb/HT5642",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5642"
},
{
"name": "oval:org.mitre.oval:def:15336",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336"
},
{
"name": "APPLE-SA-2013-03-14-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
},
{
"name": "APPLE-SA-2013-01-28-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.1180.59",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:google:frame:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "21.0.1180.56",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2012-2857"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://code.google.com/p/chromium/issues/detail?id=136235",
"refsource": "CONFIRM",
"tags": [],
"url": "http://code.google.com/p/chromium/issues/detail?id=136235"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
},
{
"name": "APPLE-SA-2013-01-28-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT5642",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5642"
},
{
"name": "APPLE-SA-2013-03-14-2",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html"
},
{
"name": "oval:org.mitre.oval:def:15336",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-09-19T01:35Z",
"publishedDate": "2012-08-06T15:55Z"
}
}
}
CERTA-2013-AVI-186
Vulnerability from certfr_avis - Published: 2013-03-18 - Updated: 2013-03-18
De multiples vulnérabilités ont été corrigées dans Apple Safari. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à Safari 6.0.3
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 Safari 6.0.3\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0956",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0956"
},
{
"name": "CVE-2013-0949",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0949"
},
{
"name": "CVE-2013-0952",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0952"
},
{
"name": "CVE-2013-0961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0961"
},
{
"name": "CVE-2013-0953",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0953"
},
{
"name": "CVE-2013-0954",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0954"
},
{
"name": "CVE-2013-0950",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0950"
},
{
"name": "CVE-2013-0959",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0959"
},
{
"name": "CVE-2013-0955",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0955"
},
{
"name": "CVE-2013-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0958"
},
{
"name": "CVE-2013-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0960"
},
{
"name": "CVE-2013-0948",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0948"
},
{
"name": "CVE-2012-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2857"
},
{
"name": "CVE-2013-0951",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0951"
}
],
"initial_release_date": "2013-03-18T00:00:00",
"last_revision_date": "2013-03-18T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-186",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-03-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple Safari\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance et une injection\nde code indirecte \u00e0 distance (XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5671 du 14 mars 2013",
"url": "http://support.apple.com/kb/HT5671"
}
]
}
CERTA-2013-AVI-075
Vulnerability from certfr_avis - Published: 2013-01-30 - Updated: 2013-01-30
De multiples vulnérabilités ont été corrigées dans Apple iOS. Certaines d'entre elles permettent à un attaquant d'exécuter du code arbitraire à distance au moyen de pages Web spécialement conçues.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple iOS versions antérieures à 6.1
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eApple iOS versions ant\u00e9rieures \u00e0 6.1\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3607"
},
{
"name": "CVE-2013-0956",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0956"
},
{
"name": "CVE-2013-0949",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0949"
},
{
"name": "CVE-2012-3701",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3701"
},
{
"name": "CVE-2013-0963",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0963"
},
{
"name": "CVE-2013-0974",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0974"
},
{
"name": "CVE-2013-0952",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0952"
},
{
"name": "CVE-2013-0953",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0953"
},
{
"name": "CVE-2013-0954",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0954"
},
{
"name": "CVE-2012-2824",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2824"
},
{
"name": "CVE-2013-0950",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0950"
},
{
"name": "CVE-2012-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3606"
},
{
"name": "CVE-2013-0959",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0959"
},
{
"name": "CVE-2012-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2889"
},
{
"name": "CVE-2013-0962",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0962"
},
{
"name": "CVE-2011-3058",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3058"
},
{
"name": "CVE-2013-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0964"
},
{
"name": "CVE-2013-0955",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0955"
},
{
"name": "CVE-2012-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2619"
},
{
"name": "CVE-2013-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0968"
},
{
"name": "CVE-2013-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0958"
},
{
"name": "CVE-2012-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3632"
},
{
"name": "CVE-2013-0948",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0948"
},
{
"name": "CVE-2012-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2857"
},
{
"name": "CVE-2012-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3621"
},
{
"name": "CVE-2012-3687",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3687"
},
{
"name": "CVE-2013-0951",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0951"
}
],
"initial_release_date": "2013-01-30T00:00:00",
"last_revision_date": "2013-01-30T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-075",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple iOS\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au moyen de pages Web\nsp\u00e9cialement con\u00e7ues.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5642 du 28 janvier 2013",
"url": "http://support.apple.com/kb/HT5642"
}
]
}
CERTA-2012-AVI-415
Vulnerability from certfr_avis - Published: 2012-08-02 - Updated: 2012-08-02
De multiples vulnérabilités ont été corrigées dans Google Chrome. Ces vulnérabilités concernent notamment l'utilisation de pointeurs libérés et le débordement de zones mémoire. Elles peuvent être exploitées par une personne malveillante distante pour exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Chrome, versions antérieures à 21.0.1180.60.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eGoogle Chrome, versions ant\u00e9rieures \u00e0 21.0.1180.60.\u003c/p\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2847"
},
{
"name": "CVE-2012-2850",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2850"
},
{
"name": "CVE-2012-2856",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2856"
},
{
"name": "CVE-2012-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2849"
},
{
"name": "CVE-2012-2852",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2852"
},
{
"name": "CVE-2012-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2853"
},
{
"name": "CVE-2012-2851",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2851"
},
{
"name": "CVE-2012-2858",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2858"
},
{
"name": "CVE-2012-2855",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2855"
},
{
"name": "CVE-2012-2860",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2860"
},
{
"name": "CVE-2012-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2848"
},
{
"name": "CVE-2012-2846",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2846"
},
{
"name": "CVE-2012-2854",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2854"
},
{
"name": "CVE-2012-2859",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2859"
},
{
"name": "CVE-2012-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2857"
}
],
"initial_release_date": "2012-08-02T00:00:00",
"last_revision_date": "2012-08-02T00:00:00",
"links": [
{
"title": "Note de version Google Chrome 2012/07/stable-channel-release du 31 juillet 2012 :",
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
}
],
"reference": "CERTA-2012-AVI-415",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eGoogle Chrome\u003c/span\u003e. Ces vuln\u00e9rabilit\u00e9s concernent\nnotamment l\u0027utilisation de pointeurs lib\u00e9r\u00e9s et le d\u00e9bordement de zones\nm\u00e9moire. Elles peuvent \u00eatre exploit\u00e9es par une personne malveillante\ndistante pour ex\u00e9cuter du code arbitraire.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 31 juillet 2012",
"url": null
}
]
}
CERTA-2013-AVI-317
Vulnerability from certfr_avis - Published: 2013-05-21 - Updated: 2013-05-21
De multiples vulnérabilités ont été corrigées dans Apple iTunes. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple iTunes versions antérieures à 11.0.3
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eApple iTunes versions ant\u00e9rieures \u00e0 11.0.3\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0993",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0993"
},
{
"name": "CVE-2012-5112",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5112"
},
{
"name": "CVE-2013-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1006"
},
{
"name": "CVE-2013-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0998"
},
{
"name": "CVE-2013-0912",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0912"
},
{
"name": "CVE-2013-0956",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0956"
},
{
"name": "CVE-2013-0949",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0949"
},
{
"name": "CVE-2013-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1001"
},
{
"name": "CVE-2013-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1005"
},
{
"name": "CVE-2013-0952",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0952"
},
{
"name": "CVE-2013-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0992"
},
{
"name": "CVE-2013-0961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0961"
},
{
"name": "CVE-2013-0953",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0953"
},
{
"name": "CVE-2013-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0994"
},
{
"name": "CVE-2013-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1010"
},
{
"name": "CVE-2013-0954",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0954"
},
{
"name": "CVE-2013-0879",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0879"
},
{
"name": "CVE-2012-2824",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2824"
},
{
"name": "CVE-2013-1007",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1007"
},
{
"name": "CVE-2013-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0995"
},
{
"name": "CVE-2013-0950",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0950"
},
{
"name": "CVE-2013-0991",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0991"
},
{
"name": "CVE-2013-0959",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0959"
},
{
"name": "CVE-2013-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1000"
},
{
"name": "CVE-2013-1008",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1008"
},
{
"name": "CVE-2013-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1014"
},
{
"name": "CVE-2013-1003",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1003"
},
{
"name": "CVE-2013-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1004"
},
{
"name": "CVE-2013-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1002"
},
{
"name": "CVE-2013-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0996"
},
{
"name": "CVE-2012-3748",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3748"
},
{
"name": "CVE-2013-0955",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0955"
},
{
"name": "CVE-2013-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0958"
},
{
"name": "CVE-2013-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0997"
},
{
"name": "CVE-2013-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1011"
},
{
"name": "CVE-2013-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0999"
},
{
"name": "CVE-2013-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0960"
},
{
"name": "CVE-2013-0948",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0948"
},
{
"name": "CVE-2012-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2857"
},
{
"name": "CVE-2013-0951",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0951"
}
],
"initial_release_date": "2013-05-21T00:00:00",
"last_revision_date": "2013-05-21T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-317",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-05-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple iTunes\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple iTunes",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5766 du 16 mai 2013",
"url": "http://support.apple.com/kb/HT5766"
}
]
}
GHSA-GRQ7-VWG7-HVP3
Vulnerability from github – Published: 2022-05-17 00:59 – Updated: 2022-05-17 00:59Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.
{
"affected": [],
"aliases": [
"CVE-2012-2857"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-08-06T15:55:00Z",
"severity": "MODERATE"
},
"details": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.",
"id": "GHSA-grq7-vwg7-hvp3",
"modified": "2022-05-17T00:59:19Z",
"published": "2022-05-17T00:59:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2857"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336"
},
{
"type": "WEB",
"url": "http://code.google.com/p/chromium/issues/detail?id=136235"
},
{
"type": "WEB",
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5642"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2012-2857
Vulnerability from fkie_nvd - Published: 2012-08-06 15:55 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| apple | iphone_os | * | |
| apple | iphone_os | 6.0 | |
| apple | iphone_os | 6.0.1 | |
| chrome | * | ||
| chrome | 21.0.1180.0 | ||
| chrome | 21.0.1180.1 | ||
| chrome | 21.0.1180.2 | ||
| chrome | 21.0.1180.31 | ||
| chrome | 21.0.1180.32 | ||
| chrome | 21.0.1180.33 | ||
| chrome | 21.0.1180.34 | ||
| chrome | 21.0.1180.35 | ||
| chrome | 21.0.1180.36 | ||
| chrome | 21.0.1180.37 | ||
| chrome | 21.0.1180.38 | ||
| chrome | 21.0.1180.39 | ||
| chrome | 21.0.1180.41 | ||
| chrome | 21.0.1180.46 | ||
| chrome | 21.0.1180.47 | ||
| chrome | 21.0.1180.48 | ||
| chrome | 21.0.1180.49 | ||
| chrome | 21.0.1180.50 | ||
| chrome | 21.0.1180.51 | ||
| chrome | 21.0.1180.52 | ||
| chrome | 21.0.1180.53 | ||
| chrome | 21.0.1180.54 | ||
| chrome | 21.0.1180.55 | ||
| chrome | 21.0.1180.56 | ||
| chrome | 21.0.1180.57 | ||
| frame | - | ||
| microsoft | windows | * | |
| chrome | * | ||
| chrome | 21.0.1180.0 | ||
| chrome | 21.0.1180.1 | ||
| chrome | 21.0.1180.2 | ||
| chrome | 21.0.1180.31 | ||
| chrome | 21.0.1180.32 | ||
| chrome | 21.0.1180.33 | ||
| chrome | 21.0.1180.34 | ||
| chrome | 21.0.1180.35 | ||
| chrome | 21.0.1180.36 | ||
| chrome | 21.0.1180.37 | ||
| chrome | 21.0.1180.38 | ||
| chrome | 21.0.1180.39 | ||
| chrome | 21.0.1180.41 | ||
| chrome | 21.0.1180.46 | ||
| chrome | 21.0.1180.47 | ||
| chrome | 21.0.1180.48 | ||
| chrome | 21.0.1180.49 | ||
| chrome | 21.0.1180.50 | ||
| chrome | 21.0.1180.51 | ||
| chrome | 21.0.1180.52 | ||
| chrome | 21.0.1180.53 | ||
| chrome | 21.0.1180.54 | ||
| chrome | 21.0.1180.55 | ||
| apple | mac_os_x | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD52712-0484-421B-A5DD-2CF0B4C027BD",
"versionEndIncluding": "6.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE0068D-C699-4646-9658-610409925A79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87C215DD-BC98-4283-BF13-69556EF7CB78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C265F9-3170-4216-81E6-EFEDCD76F46C",
"versionEndIncluding": "21.0.1180.59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*",
"matchCriteriaId": "767C0C1A-EAC4-4F98-9E80-CFDA5069F118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0E2554F0-0DEB-41A0-A595-6A524F9EC001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4F542051-CEED-45A4-BB83-937069D07CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*",
"matchCriteriaId": "AC926FFC-EF03-46F0-B5B5-02B34571D6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:*",
"matchCriteriaId": "24849FF0-F873-4365-9B82-F16AD7F4A291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.33:*:*:*:*:*:*:*",
"matchCriteriaId": "8E784307-0538-4524-94EA-A88B1ABD0E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.34:*:*:*:*:*:*:*",
"matchCriteriaId": "5655EFE7-69CB-469F-A00A-D6F3F7F492E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.35:*:*:*:*:*:*:*",
"matchCriteriaId": "D3B22D68-9E32-4566-8ED1-F1CE87903F98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.36:*:*:*:*:*:*:*",
"matchCriteriaId": "40DB1183-DFF5-4251-BCDF-2F7696ABBFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.37:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD5341A-E508-4E5B-B03F-677D97E5A464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.38:*:*:*:*:*:*:*",
"matchCriteriaId": "E096479F-4C69-445A-8C2B-7201896F401B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.39:*:*:*:*:*:*:*",
"matchCriteriaId": "25756B8C-FBEB-4D7F-99E6-EA7D27B07B39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.41:*:*:*:*:*:*:*",
"matchCriteriaId": "41371794-2083-4188-90BE-506419DC0B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.46:*:*:*:*:*:*:*",
"matchCriteriaId": "51FF3E52-3E8E-4D2F-ABA3-B7D83219D723",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.47:*:*:*:*:*:*:*",
"matchCriteriaId": "981570FA-6B44-49A8-9C9B-7D5127E90F6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.48:*:*:*:*:*:*:*",
"matchCriteriaId": "36D2B7FE-2B20-47CA-9B3C-B726E21659E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.49:*:*:*:*:*:*:*",
"matchCriteriaId": "858BDFA4-E9CB-4537-ABA7-4283318CA501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.50:*:*:*:*:*:*:*",
"matchCriteriaId": "76D0CD04-8EF4-4B6A-BD4F-1DFCDDDD4DED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.51:*:*:*:*:*:*:*",
"matchCriteriaId": "9E912B5D-81F3-4A93-A0E6-B1CFDE2B46EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.52:*:*:*:*:*:*:*",
"matchCriteriaId": "B578A2BC-9360-428C-9AFE-DC9DB9E0A621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.53:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCB6048-5A18-4FD6-A21B-95B595CF943C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.54:*:*:*:*:*:*:*",
"matchCriteriaId": "28882288-859D-425C-8BA3-F46D058B61D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.55:*:*:*:*:*:*:*",
"matchCriteriaId": "444AD7BB-FE0B-4A51-BA89-EE2647F4E8AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.56:*:*:*:*:*:*:*",
"matchCriteriaId": "A0692DD3-562D-4BE7-BB61-1549EFFF9CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.57:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF70696-70A8-4DFA-A0C3-172A103F3F24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:frame:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFF5F06-FE87-4120-A2EE-F66CEF5D7E0E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95449FAB-4F05-4CD9-AC28-050164CB52EB",
"versionEndIncluding": "21.0.1180.56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*",
"matchCriteriaId": "767C0C1A-EAC4-4F98-9E80-CFDA5069F118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0E2554F0-0DEB-41A0-A595-6A524F9EC001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4F542051-CEED-45A4-BB83-937069D07CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*",
"matchCriteriaId": "AC926FFC-EF03-46F0-B5B5-02B34571D6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:*",
"matchCriteriaId": "24849FF0-F873-4365-9B82-F16AD7F4A291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.33:*:*:*:*:*:*:*",
"matchCriteriaId": "8E784307-0538-4524-94EA-A88B1ABD0E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.34:*:*:*:*:*:*:*",
"matchCriteriaId": "5655EFE7-69CB-469F-A00A-D6F3F7F492E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.35:*:*:*:*:*:*:*",
"matchCriteriaId": "D3B22D68-9E32-4566-8ED1-F1CE87903F98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.36:*:*:*:*:*:*:*",
"matchCriteriaId": "40DB1183-DFF5-4251-BCDF-2F7696ABBFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.37:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD5341A-E508-4E5B-B03F-677D97E5A464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.38:*:*:*:*:*:*:*",
"matchCriteriaId": "E096479F-4C69-445A-8C2B-7201896F401B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.39:*:*:*:*:*:*:*",
"matchCriteriaId": "25756B8C-FBEB-4D7F-99E6-EA7D27B07B39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.41:*:*:*:*:*:*:*",
"matchCriteriaId": "41371794-2083-4188-90BE-506419DC0B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.46:*:*:*:*:*:*:*",
"matchCriteriaId": "51FF3E52-3E8E-4D2F-ABA3-B7D83219D723",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.47:*:*:*:*:*:*:*",
"matchCriteriaId": "981570FA-6B44-49A8-9C9B-7D5127E90F6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.48:*:*:*:*:*:*:*",
"matchCriteriaId": "36D2B7FE-2B20-47CA-9B3C-B726E21659E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.49:*:*:*:*:*:*:*",
"matchCriteriaId": "858BDFA4-E9CB-4537-ABA7-4283318CA501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.50:*:*:*:*:*:*:*",
"matchCriteriaId": "76D0CD04-8EF4-4B6A-BD4F-1DFCDDDD4DED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.51:*:*:*:*:*:*:*",
"matchCriteriaId": "9E912B5D-81F3-4A93-A0E6-B1CFDE2B46EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.52:*:*:*:*:*:*:*",
"matchCriteriaId": "B578A2BC-9360-428C-9AFE-DC9DB9E0A621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.53:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCB6048-5A18-4FD6-A21B-95B595CF943C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.54:*:*:*:*:*:*:*",
"matchCriteriaId": "28882288-859D-425C-8BA3-F46D058B61D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:chrome:21.0.1180.55:*:*:*:*:*:*:*",
"matchCriteriaId": "444AD7BB-FE0B-4A51-BA89-EE2647F4E8AE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document."
},
{
"lang": "es",
"value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n (use-after-free) en las Hojas de Estilo en Cascada (CSS) en la implementaci\u00f3n DOM Google Chrome anteriores a v21.0.1180.57 en Mac OS X y Linux, y anteriores a v21.0.1180.60 en Windows y Chrome Frame, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de un documento manipulado."
}
],
"id": "CVE-2012-2857",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-08-06T15:55:01.917",
"references": [
{
"source": "chrome-cve-admin@google.com",
"url": "http://code.google.com/p/chromium/issues/detail?id=136235"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://support.apple.com/kb/HT5642"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://code.google.com/p/chromium/issues/detail?id=136235"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5642"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.