CVE-2009-0162

Cross-site scripting (XSS) vulnerability in Safari before 3.2.3, and 4 Public Beta, on Apple Mac OS X 10.5 before 10.5.7 and Windows allows remote attackers to inject arbitrary web script or HTML via a crafted feed: URL.
References
Link Resource
http://lists.apple.com/archives/security-announce/2009/May/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00001.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html Patch Vendor Advisory
http://secunia.com/advisories/35056
http://secunia.com/advisories/35074
http://support.apple.com/kb/HT3549 Patch Vendor Advisory
http://support.apple.com/kb/HT3550
http://www.securityfocus.com/bid/34925
http://www.securitytracker.com/id?1022206
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1298
https://exchange.xforce.ibmcloud.com/vulnerabilities/50476
http://lists.apple.com/archives/security-announce/2009/May/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00001.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html Patch Vendor Advisory
http://secunia.com/advisories/35056
http://secunia.com/advisories/35074
http://support.apple.com/kb/HT3549 Patch Vendor Advisory
http://support.apple.com/kb/HT3550
http://www.securityfocus.com/bid/34925
http://www.securitytracker.com/id?1022206
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1298
https://exchange.xforce.ibmcloud.com/vulnerabilities/50476
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2009/May/msg00000.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/May/msg00000.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2009/May/msg00001.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/May/msg00001.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - Patch, Vendor Advisory
References () http://secunia.com/advisories/35056 - () http://secunia.com/advisories/35056 -
References () http://secunia.com/advisories/35074 - () http://secunia.com/advisories/35074 -
References () http://support.apple.com/kb/HT3549 - Patch, Vendor Advisory () http://support.apple.com/kb/HT3549 - Patch, Vendor Advisory
References () http://support.apple.com/kb/HT3550 - () http://support.apple.com/kb/HT3550 -
References () http://www.securityfocus.com/bid/34925 - () http://www.securityfocus.com/bid/34925 -
References () http://www.securitytracker.com/id?1022206 - () http://www.securitytracker.com/id?1022206 -
References () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2009/1297 - () http://www.vupen.com/english/advisories/2009/1297 -
References () http://www.vupen.com/english/advisories/2009/1298 - () http://www.vupen.com/english/advisories/2009/1298 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50476 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50476 -

Information

Published : 2009-05-13 15:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0162

Mitre link : CVE-2009-0162

CVE.ORG link : CVE-2009-0162


JSON object : View

Products Affected

apple

  • mac_os_x
  • safari
  • mac_os_x_server

microsoft

  • windows_vista
  • windows_xp
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')