Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apple:safari:*:*:mac:*:*:*:*:*", "matchCriteriaId": "2AA3463B-FB1D-4957-A738-946399B1B9DB", "versionEndIncluding": "4.0_beta", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:0.8:*:mac:*:*:*:*:*", "matchCriteriaId": "1F5F96DD-BD44-497B-A05E-326819BC46F8", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:0.9:*:mac:*:*:*:*:*", "matchCriteriaId": "2B00DC91-9895-405E-B9B4-211ABC3728DB", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:1.0:*:mac:*:*:*:*:*", "matchCriteriaId": "82C4A098-7EAC-4611-B621-3F0EB1B15960", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:1.0.3:*:mac:*:*:*:*:*", "matchCriteriaId": "56B016E7-C403-42AC-BF75-9BA723122A2F", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:1.1:*:mac:*:*:*:*:*", "matchCriteriaId": "83CFAFD2-630E-4DB9-B187-6918CFE3075C", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:1.2:*:mac:*:*:*:*:*", "matchCriteriaId": "F03B8DC9-B295-42A8-904F-3D1F827FFECD", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:1.3:*:mac:*:*:*:*:*", "matchCriteriaId": "1876BC3B-B207-4E81-A0A7-259AFE6F2DEA", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:1.3.1:*:mac:*:*:*:*:*", "matchCriteriaId": "03BBCC9D-E160-4614-B2B8-6359FE644E02", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:1.3.2:*:mac:*:*:*:*:*", "matchCriteriaId": "CDB6B46E-30E1-4E16-A941-F5E19AB34493", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:2.0:*:mac:*:*:*:*:*", "matchCriteriaId": "E783789C-C5D4-47A2-A947-D19793B182E2", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:2.0.2:*:mac:*:*:*:*:*", "matchCriteriaId": "CE3C68CF-21A2-47D8-84F2-FD3219E90043", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:2.0.4:*:mac:*:*:*:*:*", "matchCriteriaId": "4D4AD962-D9AD-48E5-9B53-E3C1593D43CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0:*:mac:*:*:*:*:*", "matchCriteriaId": "30FA25DB-3525-4755-B038-6572B2457CF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*", "matchCriteriaId": "9270F5C4-63B9-48C5-9D6D-9CDA1461205C", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0.3:*:mac:*:*:*:*:*", "matchCriteriaId": "9BE1D829-A6C9-4B5C-971B-5515FB92061D", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0.4:*:mac:*:*:*:*:*", "matchCriteriaId": "8BC133D1-E120-4B84-85DC-1D528CB77FAA", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.1:*:mac:*:*:*:*:*", "matchCriteriaId": "90D8505E-35D2-40A1-9D75-1A023C4DD65E", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.1.1:*:mac:*:*:*:*:*", "matchCriteriaId": "1D087ECA-D214-4A6B-8F64-7F8AABB14706", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.1.2:*:mac:*:*:*:*:*", "matchCriteriaId": "B4ABDE92-E8A8-431D-BF9C-9A54667A8664", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.2.1:*:mac:*:*:*:*:*", "matchCriteriaId": "94956778-7E73-4B42-B7B1-0D11837B8476", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.2.3:*:mac:*:*:*:*:*", "matchCriteriaId": "AC54BF41-2BF6-4604-AEFA-532453AB91E5", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apple:safari:*:*:windows:*:*:*:*:*", "matchCriteriaId": "F1F650EC-4778-4233-9CF5-2B809CE4C799", "versionEndIncluding": "3.2.3", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0:*:windows:*:*:*:*:*", "matchCriteriaId": "A588615E-EE35-4E19-8BDA-598ED9664686", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0.1:*:windows:*:*:*:*:*", "matchCriteriaId": "3E61C168-482B-412A-97E8-B1C651797EDF", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0.2:*:windows:*:*:*:*:*", "matchCriteriaId": "32024B14-B4F7-466E-AEF2-0D3A7E8E1060", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0.3:*:windows:*:*:*:*:*", "matchCriteriaId": "D137F48A-E670-4BDB-B003-C6BB2A33F250", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.0.4:*:windows:*:*:*:*:*", "matchCriteriaId": "85AB4EDB-408D-4D2F-95BE-B578455EFA4E", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.1:*:windows:*:*:*:*:*", "matchCriteriaId": "0B256D38-257B-4C3D-9EA5-2255BF3A329C", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.1.1:*:windows:*:*:*:*:*", "matchCriteriaId": "158AEA23-B5DB-4CBC-8391-2D97233A8E9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.1.2:*:windows:*:*:*:*:*", "matchCriteriaId": "218FBDC4-29AF-4BA1-A3FE-4E19B0E3E654", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.2:-:windows:*:*:*:*:*", "matchCriteriaId": "77F31F4B-5305-4D75-9277-95EF99A969A9", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.2.1:*:windows:*:*:*:*:*", "matchCriteriaId": "BDE11F09-3D57-4CF0-8165-90FB234CC403", "vulnerable": true}, {"criteria": "cpe:2.3:a:apple:safari:3.2.2:*:windows:*:*:*:*:*", "matchCriteriaId": "99118352-6845-4704-B4A3-F98E8C06E0FD", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:apple:iphone_os:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "41DB23F0-7226-4D0B-A3FA-A801F02EBA6B", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "B669868B-F358-4D5B-9D64-4A462F261553", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E28FB0CB-D636-4F85-B5F7-70EC30053925", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "A14B31DE-AA3D-4FA2-A4F4-0A6A51AFA7FE", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4AEDE82-E317-4066-A34F-BB3BCD3F53E2", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC16D1C-065A-4D1A-BA6E-528A71DF65CC", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*", "matchCriteriaId": "4261E5C1-DC93-437E-B84F-A30380AFDC40", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "079BB54C-25FD-4B26-B171-368911960F76", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "27319629-171F-42AA-A95F-2D71F78097D0", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "DF292FED-19A4-4031-9B1F-151C0146F3B6", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "5183082C-556F-479F-9FC1-42B59BBB840B", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "AAC3FBF0-F128-412D-9FD5-13BB2EB92DD7", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "297F9438-0F04-4128-94A8-A504B600929E", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*", "matchCriteriaId": "2FFCFEA4-C5E2-4C46-B8C3-ADCDBA4B85EF", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "7E7AA027-8CF9-49BD-A000-82880E41D622", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F8618621-F871-4531-9F6C-7D60F2BF8B75", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*", "matchCriteriaId": "4FA51920-223B-4DF4-802C-188F5A8B0563", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "4385635D-46F2-4642-9C78-1346DC120492", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "824DED2D-FA1D-46FC-8252-6E25546DAE29", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*", "matchCriteriaId": "2C63C36E-1997-4F44-80AD-E665CE46A278", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "20DAE911-C037-4F10-82A3-EF42D5FB71D8", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1641DDFA-3BF1-467F-8EC3-98114FF9F07B", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF40CDA4-4716-4815-9ED0-093FE266734C", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*", "matchCriteriaId": "02BFDD6F-B9C3-42BB-A84A-828193FAA137", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "0A66D6DC-9A48-4BD6-9E01-0D9FF388457C", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "CFD4325B-A86A-4C1B-930F-56C17FB6281D", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "C59B8C50-BF5D-4E9A-8E5B-99B34E974B5A", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D06D54D-97FD-49FD-B251-CC86FBA68CA6", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "2904DEFA-7769-43DB-B3D0-B552AE8F06A6", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "D4CE4199-BBF5-4F42-8BBC-BD946079C912", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "25A5D868-0016-44AB-80E6-E5DF91F15455", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "0AD5106E-CD7C-4952-A9B1-5F72D99276E6", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "34346F55-4972-427B-8F96-780FA91DB95D", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "B7235341-983F-4578-98DC-39BC278A7556", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.2:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "AE65CA8B-68CB-428C-AC32-6F9100F9E507", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "BA5C2D75-4019-45EB-8AF9-A850B5349507", "vulnerable": true}, {"criteria": "cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "AD136376-331D-494F-9D12-7E631546E8CB", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*", "matchCriteriaId": "FE5094C4-1338-4189-B5FD-C9AFFF091D6B", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to \"recursion in certain DOM event handlers.\""}, {"lang": "es", "value": "Una vulnerabilidad de uso de memoria previamente liberada en WebKit, como es usado en Safari de Apple anterior a versi\u00f3n 4.0, iPhone OS versiones 1.0 hasta 2.2.1, iPhone OS para iPod touch versiones 1.1 hasta 2.2.1, Chrome de Google versi\u00f3n 1.0.154.53, y posiblemente otros productos, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y bloqueo de aplicaci\u00f3n) mediante el establecimiento de una propiedad no especificada de una etiqueta HTML que causa que los elementos secundarios se liberen y m\u00e1s adelante se tenga acceso cuando se produce un error HTML, relacionado con \"recursion in certain DOM event handlers\"."}], "id": "CVE-2009-1690", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2009-06-10T14:30:00.437", "references": [{"source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=803"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"}, {"source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"}, {"source": "cve@mitre.org", "url": "http://osvdb.org/54990"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/35379"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/36057"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/36062"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/36790"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/37746"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/43068"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://securitytracker.com/id?1022345"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://support.apple.com/kb/HT3613"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://support.apple.com/kb/HT3639"}, {"source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1950"}, {"source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:330"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Patch"], "url": "http://www.securityfocus.com/bid/35260"}, {"source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-822-1"}, {"source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-836-1"}, {"source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-857-1"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/1522"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/1621"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0212"}, {"source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11009"}, {"source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"}, {"source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"}, {"source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html"}, {"source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=803"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/54990"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/35379"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/36057"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/36062"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/36790"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/37746"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/43068"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://securitytracker.com/id?1022345"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://support.apple.com/kb/HT3613"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://support.apple.com/kb/HT3639"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1950"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:330"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch"], "url": "http://www.securityfocus.com/bid/35260"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-822-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-836-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-857-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/1522"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/1621"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0212"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11009"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}], "source": "nvd@nist.gov", "type": "Primary"}]}