ラベル Apple Safari の投稿を表示しています。 すべての投稿を表示
ラベル Apple Safari の投稿を表示しています。 すべての投稿を表示

2011-08-24

Canonical Ltd. Ubuntu Linux

ソフト名:Canonical Ltd. Ubuntu Linux 10.04/10.10 (libwebkit, Google Chrome 4.x/5.x/6.x/7.x/8.x, Apple Safari 4.x/5.x)
回避策:USN-1195-1にて対応
脆弱性:システムアクセス, DoS攻撃, セキュリティ制限の回避, リモートコード実行, 区域外メモリの使用, 未知の脆弱性, DoS攻撃, ブラウザのクラッシュ, 機密情報の奪取, 不特定のエラー, スプーフィング攻撃, DoS攻撃, セキュリティの強度不足, メモリ破壊, 整数オーバーフロー, ポップアップブロッカーの回避, ページ違反エラー, 解放後使用エラー, アウトオブメモリ, バッファオーバーフロー
ソース:
CVE:CVE-2010-1824, CVE-2010-2646, CVE-2010-2651, CVE-2010-2900, CVE-2010-3120, CVE-2010-3254, CVE-2010-3812, CVE-2010-3813, CVE-2010-4040, CVE-2010-4042, CVE-2010-4197, CVE-2010-4198, CVE-2010-4199, CVE-2010-4204, CVE-2010-4206, CVE-2010-4492, CVE-2010-4493, CVE-2010-4577, CVE-2010-4578, CVE-2011-0482, CVE-2011-0778
危険性:High Risk

2011-07-26

Apple Safari

ソフト名:Apple Safari 5.x
回避策:5.0.6/5.1へのアップデートにて対応
脆弱性:セキュリティ制限の回避, XSS, スプーフィング, データ操作, 機密情報の奪取, システムアクセス, 不正HTMLの実行, スクリプトコード実行, リモートコード実行, 整数オーバーフローエラー, バッファオーバーフロー, オフバイワンエラー, 解放後使用エラー, クロスオリジンエラー, メモリ破壊, ファイル操作
CVE:CVE-2010-1383, CVE-2010-1420, CVE-2010-1823, CVE-2011-0164, CVE-2011-0195, CVE-2011-0200, CVE-2011-0201, CVE-2011-0202, CVE-2011-0204, CVE-2011-0206, CVE-2011-0214, CVE-2011-0215, CVE-2011-0216, CVE-2011-0217, CVE-2011-0218, CVE-2011-0219, CVE-2011-0221, CVE-2011-0222, CVE-2011-0223, CVE-2011-0225, CVE-2011-0232, CVE-2011-0233, CVE-2011-0234, CVE-2011-0235, CVE-2011-0237, CVE-2011-0238, CVE-2011-0240, CVE-2011-0241, CVE-2011-0242, CVE-2011-0244, CVE-2011-0253, CVE-2011-0254, CVE-2011-0255, CVE-2011-0981, CVE-2011-0983, CVE-2011-1107, CVE-2011-1109, CVE-2011-1114, CVE-2011-1115, CVE-2011-1117, CVE-2011-1121, CVE-2011-1188, CVE-2011-1190, CVE-2011-1203, CVE-2011-1204, CVE-2011-1288, CVE-2011-1293, CVE-2011-1295, CVE-2011-1296, CVE-2011-1449, CVE-2011-1451, CVE-2011-1453, CVE-2011-1457, CVE-2011-1462, CVE-2011-1774, CVE-2011-1797
危険性:High Risk

2011-03-11

Apple Safari, Apple iOS, Apple TV

ソフト名:Apple Safari 5.0.4未満, Apple iOS 4.3未満 (and iPad , iPod touch), Apple TV 4.2未満
回避策:アップデートにて対応
脆弱性:XSS, スプーフィング攻撃, 機密情報の奪取, システムアクセス, ヒープメモリ破壊, インデックスエラー, バッファオーバーフロー, バウンダリエラー, 解放後使用エラー, CSS挿入, Webキャッシュ汚染, ファイル操作, 不正HTMLの実行, スクリプトコード実行
ソース:
http://www.apple.com/safari/
http://www.apple.com/ios/
http://www.apple.com/ipad/ios4/
http://www.apple.com/ipodtouch/
http://www.apple.com/appletv/
http://support.apple.com/kb/HT4564
http://support.apple.com/kb/HT4565
http://support.apple.com/kb/HT4566
http://secunia.com/advisories/40110/
http://secunia.com/advisories/41738/
http://secunia.com/advisories/43582/
http://secunia.com/advisories/43593/
http://secunia.com/advisories/43696/
http://secunia.com/advisories/43697/
http://secunia.com/advisories/43698/
http://dvw-j.blogspot.com/2011/03/libtiff-red-hat-desktop-red-hat.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0122
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0123
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0124
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0126
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0130
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0142
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0148
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0153
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0154
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0155
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0156
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0157
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0158
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0159
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0165
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0168
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0191
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192
CVE:CVE-2010-1205, CVE-2010-1792, CVE-2010-1824, CVE-2010-2249, CVE-2010-3855, CVE-2010-4008, CVE-2010-4494, CVE-2011-0111, CVE-2011-0112, CVE-2011-0113, CVE-2011-0114, CVE-2011-0115, CVE-2011-0116, CVE-2011-0117, CVE-2011-0118, CVE-2011-0119, CVE-2011-0120, CVE-2011-0121, CVE-2011-0122, CVE-2011-0123, CVE-2011-0124, CVE-2011-0125, CVE-2011-0126, CVE-2011-0127, CVE-2011-0128, CVE-2011-0129, CVE-2011-0130, CVE-2011-0131, CVE-2011-0132, CVE-2011-0133, CVE-2011-0134, CVE-2011-0135, CVE-2011-0136, CVE-2011-0137, CVE-2011-0138, CVE-2011-0139, CVE-2011-0140, CVE-2011-0141, CVE-2011-0142, CVE-2011-0143, CVE-2011-0144, CVE-2011-0145, CVE-2011-0146, CVE-2011-0147, CVE-2011-0148, CVE-2011-0149, CVE-2011-0150, CVE-2011-0151, CVE-2011-0152, CVE-2011-0153, CVE-2011-0154, CVE-2011-0155, CVE-2011-0156, CVE-2011-0157, CVE-2011-0158, CVE-2011-0159, CVE-2011-0160, CVE-2011-0161, CVE-2011-0162, CVE-2011-0163, CVE-2011-0164, CVE-2011-0165, CVE-2011-0166, CVE-2011-0167, CVE-2011-0168, CVE-2011-0169, CVE-2011-0170, CVE-2011-0191, CVE-2011-0192
危険性:High Risk

2010-11-23

Apple Safari

ソフト名:Apple Safari 4.0~5.0.2
回避策:アップデートにて対応
脆弱性:リモートコード実行, セキュリティの強度不足, スプーフィング攻撃, 整数オーバーフロー, 整数アンダーフロー, アプリケーションのクラッシュ, アフターフリーエラー, メモリアクセスエラー, メモリ破壊エラー, メモリ破壊
ソース:
http://support.apple.com/kb/HT4455
http://www.securityfocus.com/bid/44950
http://www.securityfocus.com/bid/44952
http://www.securityfocus.com/bid/44953
http://www.securityfocus.com/bid/44954
http://www.securityfocus.com/bid/44955
http://www.securityfocus.com/bid/44956
http://www.securityfocus.com/bid/44957
http://www.securityfocus.com/bid/44958
http://www.securityfocus.com/bid/44959
http://www.securityfocus.com/bid/44960
http://www.securityfocus.com/bid/44961
http://www.securityfocus.com/bid/44962
http://www.securityfocus.com/bid/44963
http://www.securityfocus.com/bid/44964
http://www.securityfocus.com/bid/44965
http://www.securityfocus.com/bid/44967
http://www.securityfocus.com/bid/44969
http://www.securityfocus.com/bid/44970
http://www.securityfocus.com/bid/44971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3816
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3821
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3826
http://secunia.com/advisories/42264
http://www.vupen.com/english/advisories/2010/3025
CVE:CVE-2010-3803, CVE-2010-3804, CVE-2010-3805, CVE-2010-3808, CVE-2010-3809, CVE-2010-3810, CVE-2010-3811, CVE-2010-3812, CVE-2010-3813, CVE-2010-3816, CVE-2010-3817, CVE-2010-3818, CVE-2010-3819, CVE-2010-3820, CVE-2010-3821, CVE-2010-3822, CVE-2010-3823, CVE-2010-3824, CVE-2010-3826
危険性:High Risk

2010-11-19

Apple Safari

ソフト名:Apple Safari 5.0.2
回避策:未対応
脆弱性:DoS攻撃, バッファオーバーフロー, アプリケーションのクラッシュ
ソース:
http://www.apple.com/safari/
http://www.exploit-db.com/exploits/15558/
危険性:Low Risk

2010-07-30

Apple Safari

ソフト名:Apple Safari 4.1/5.0
回避策:アップデートにて対応
脆弱性:XSS, リモートコード実行, メモリ破壊エラー, メモリアクセスエラー, 解放後使用エラー, バッファオーバーフロー, 認証資格情報の奪取, アプリケーションのクラッシュ
ソース:
http://support.apple.com/kb/HT4276
http://www.securityfocus.com/bid/42034
http://www.securityfocus.com/bid/42035
http://www.securityfocus.com/bid/42036
http://www.securityfocus.com/bid/42037
http://www.securityfocus.com/bid/42038
http://www.securityfocus.com/bid/42039
http://www.securityfocus.com/bid/42041
http://www.securityfocus.com/bid/42042
http://www.securityfocus.com/bid/42043
http://www.securityfocus.com/bid/42044
http://www.securityfocus.com/bid/42045
http://www.securityfocus.com/bid/42046
http://www.securityfocus.com/bid/42048
http://www.securityfocus.com/bid/42049
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793
http://www.vupen.com/english/advisories/2010/1945
CVE:CVE-2010-1778, CVE-2010-1780, CVE-2010-1782, CVE-2010-1783, CVE-2010-1784, CVE-2010-1785, CVE-2010-1786, CVE-2010-1787, CVE-2010-1788, CVE-2010-1789, CVE-2010-1790, CVE-2010-1791, CVE-2010-1792, CVE-2010-1793
危険性:High Risk

2010-07-20

Apple Safari

ソフト名:Apple Safari 4.0.2
回避策:未対応
脆弱性:クリック乗っ取り, 不正アクセス
ソース:
http://www.apple.com/safari/
http://www.exploit-db.com/exploits/14387/
危険性:Medium Risk

2010-06-11

Apple Safari

ソフト名:Apple Safari 4.1/5.0
回避策:アップデートにて対応
脆弱性:ディレクトリトラバーサル, リモートコード実行, アプリケーションのクラッシュ, 機密情報の奪取, XSS, 認証資格情報の奪取,セキュリティの強度不足, メモリ劣化エラー, マンインミドル攻撃, セキュリティ制限の回避, 区域外メモリアクセス, 閲覧履歴の奪取
ソース:
http://support.apple.com/kb/HT4196
http://www.securityfocus.com/bid/35954
http://www.securityfocus.com/bid/40644
http://www.securityfocus.com/bid/40645
http://www.securityfocus.com/bid/40646
http://www.securityfocus.com/bid/40647
http://www.securityfocus.com/bid/40649
http://www.securityfocus.com/bid/40650
http://www.securityfocus.com/bid/40652
http://www.securityfocus.com/bid/40653
http://www.securityfocus.com/bid/40654
http://www.securityfocus.com/bid/40655
http://www.securityfocus.com/bid/40656
http://www.securityfocus.com/bid/40657
http://www.securityfocus.com/bid/40658
http://www.securityfocus.com/bid/40659
http://www.securityfocus.com/bid/40661
http://www.securityfocus.com/bid/40662
http://www.securityfocus.com/bid/40663
http://www.securityfocus.com/bid/40665
http://www.securityfocus.com/bid/40666
http://www.securityfocus.com/bid/40667
http://www.securityfocus.com/bid/40668
http://www.securityfocus.com/bid/40670
http://www.securityfocus.com/bid/40671
http://www.securityfocus.com/bid/40672
http://www.securityfocus.com/bid/40675
http://www.securityfocus.com/bid/40697
http://www.securityfocus.com/bid/40698
http://www.securityfocus.com/bid/40705
http://www.securityfocus.com/bid/40707
http://www.securityfocus.com/bid/40710
http://www.securityfocus.com/bid/40714
http://www.securityfocus.com/bid/40717
http://www.securityfocus.com/bid/40726
http://www.securityfocus.com/bid/40727
http://www.securityfocus.com/bid/40732
http://www.securityfocus.com/bid/40733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0544
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774
http://secunia.com/advisories/36096
http://securitytracker.com/alerts/2009/Aug/1022674.html
http://www.vupen.com/english/advisories/2009/2172
CVE:CVE-2010-0544, CVE-2010-1391, CVE-2010-1392, CVE-2010-1393, CVE-2010-1394, CVE-2010-1395, CVE-2010-1396, CVE-2010-1397, CVE-2010-1398, CVE-2010-1399, CVE-2010-1400, CVE-2010-1401, CVE-2010-1402, CVE-2010-1403, CVE-2010-1404, CVE-2010-1405, CVE-2010-1406, CVE-2010-1408, CVE-2010-1409, CVE-2010-1410, CVE-2010-1412, CVE-2010-1413, CVE-2010-1414, CVE-2010-1415, CVE-2010-1416, CVE-2010-1417, CVE-2010-1418, CVE-2010-1419, CVE-2010-1421, CVE-2010-1422, CVE-2010-1749, CVE-2010-1758, CVE-2010-1759, CVE-2010-1761, CVE-2010-1762, CVE-2010-1764, CVE-2010-1770, CVE-2010-1771, CVE-2010-1774
危険性:High Risk

2010-05-14

2010-05-11

Apple Safari

ソフト名:Apple Safari 4.531.9.1
回避策:未対応
脆弱性:DoS攻撃, 無限ループ, ブラウザのクラッシュ
ソース:
http://h.ackack.net/?p=258
http://www.apple.com/safari/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1729
CVE:CVE-2010-1729
危険性:Low Risk

2010-04-30

Safari

ソフト名:Apple Safari 4.0.3/4.0.4
回避策:未対応
脆弱性:リモートコード実行
ソース:
http://www.apple.com/safari/
http://www.exploit-db.com/exploits/12437
危険性:High Risk

2010-04-29