cpe:/a:apple:safari:1.0 cpe:/a:apple:safari:1.0:beta cpe:/a:apple:safari:1.0:beta2 cpe:/a:apple:safari:1.0.0 cpe:/a:apple:safari:1.0.0b1 cpe:/a:apple:safari:1.0.0b2 cpe:/a:apple:safari:1.0.1 cpe:/a:apple:safari:1.0.2 cpe:/a:apple:safari:1.0.3 cpe:/a:apple:safari:1.0.3:85.8 cpe:/a:apple:safari:1.0.3:85.8.1 cpe:/a:apple:safari:1.1 cpe:/a:apple:safari:1.1.0 cpe:/a:apple:safari:1.1.1 cpe:/a:apple:safari:1.2 cpe:/a:apple:safari:1.2.0 cpe:/a:apple:safari:1.2.1 cpe:/a:apple:safari:1.2.2 cpe:/a:apple:safari:1.2.3 cpe:/a:apple:safari:1.2.4 cpe:/a:apple:safari:1.2.5 cpe:/a:apple:safari:1.3 cpe:/a:apple:safari:1.3.0 cpe:/a:apple:safari:1.3.1 cpe:/a:apple:safari:1.3.2 cpe:/a:apple:safari:1.3.2:312.5 cpe:/a:apple:safari:1.3.2:312.6 cpe:/a:apple:safari:2 cpe:/a:apple:safari:2.0 cpe:/a:apple:safari:2.0.0 cpe:/a:apple:safari:2.0.1 cpe:/a:apple:safari:2.0.2 cpe:/a:apple:safari:2.0.3 cpe:/a:apple:safari:2.0.3:417.8 cpe:/a:apple:safari:2.0.3:417.9 cpe:/a:apple:safari:2.0.3:417.9.2 cpe:/a:apple:safari:2.0.3:417.9.3 cpe:/a:apple:safari:2.0.4 cpe:/a:apple:safari:3 cpe:/a:apple:safari:3.0 cpe:/a:apple:safari:3.0.0 cpe:/a:apple:safari:3.0.0b cpe:/a:apple:safari:3.0.1 cpe:/a:apple:safari:3.0.1b cpe:/a:apple:safari:3.0.2 cpe:/a:apple:safari:3.0.2b cpe:/a:apple:safari:3.0.3 cpe:/a:apple:safari:3.0.3b cpe:/a:apple:safari:3.0.4 cpe:/a:apple:safari:3.0.4b cpe:/a:apple:safari:3.1.0 cpe:/a:apple:safari:3.1.0b cpe:/a:apple:safari:3.1.1 cpe:/a:apple:safari:3.1.2 cpe:/a:apple:safari:3.2.0 cpe:/a:apple:safari:3.2.1 cpe:/a:apple:safari:3.2.2 cpe:/a:apple:safari:4.1 cpe:/a:apple:safari:4.1.1 cpe:/a:apple:safari:4.1.2 cpe:/a:apple:safari:5.0 cpe:/a:apple:safari:5.0.1 cpe:/a:apple:safari:5.0.2 cpe:/a:apple:webkit CVE-2010-3812 2010-11-22T08:00:18.647-05:00 2017-09-18T21:31:35.130-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2010-11-22T11:28:00.000-05:00 SECUNIA 42314 SECUNIA 43068 SECUNIA 43086 BID 44960 VUPEN ADV-2010-3046 VUPEN ADV-2011-0212 VUPEN ADV-2011-0216 VUPEN ADV-2011-0552 APPLE APPLE-SA-2010-11-18-1 APPLE APPLE-SA-2010-11-22-1 FEDORA FEDORA-2011-0121 MANDRIVA MDVSA-2011:039 REDHAT RHSA-2011:0177 SUSE SUSE-SR:2011:002 CONFIRM http://support.apple.com/kb/HT4455 CONFIRM http://support.apple.com/kb/HT4456 MISC http://trac.webkit.org/changeset/68705 MISC http://www.zerodayinitiative.com/advisories/ZDI-10-257/ MISC https://bugs.webkit.org/show_bug.cgi?id=46848 CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=667022 XF safari-text-objects-code-execution(63350) Integer overflow in the Text::wholeText method in dom/Text.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving Text objects.