CVE-2010-0053
🟠 Łataj w tym tygodniu
Wykorzystanie po zwolnieniu pamięci w WebKit w Safari umożliwia zdalne wykonanie kodu.
CVSS
9.3
EPSS
5.6%
Exploit
none
Vendor
apple
Opis źródłowy (NVD)
Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the run-in Cascading Style Sheets (CSS) display property.
dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 5.6% |
| Opublikowano (NVD) | 2010-03-15 14:15:32 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 01:13:23 UTC |
Referencje
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html (product-security@apple.com)
- http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html (product-security@apple.com) [Vendor Advisory]
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html (product-security@apple.com)
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html (product-security@apple.com)
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html (product-security@apple.com)
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html (product-security@apple.com)
- http://osvdb.org/62948 (product-security@apple.com)
- http://secunia.com/advisories/41856 (product-security@apple.com)
- http://secunia.com/advisories/43068 (product-security@apple.com)
- http://support.apple.com/kb/HT4070 (product-security@apple.com) [Vendor Advisory]
- http://support.apple.com/kb/HT4225 (product-security@apple.com)
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 (product-security@apple.com)
- http://www.securityfocus.com/bid/38671 (product-security@apple.com)
- http://www.securitytracker.com/id?1023708 (product-security@apple.com)
- http://www.ubuntu.com/usn/USN-1006-1 (product-security@apple.com)
- http://www.vupen.com/english/advisories/2010/2722 (product-security@apple.com)
- http://www.vupen.com/english/advisories/2011/0212 (product-security@apple.com)
- http://www.vupen.com/english/advisories/2011/0552 (product-security@apple.com)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7323 (product-security@apple.com)