ID

VAR-201205-0398


CVE

CVE-2012-0676


TITLE

Apple Safari of WebKit Vulnerabilities entered in form fields

Trust: 0.8

sources: JVNDB: JVNDB-2012-002391

DESCRIPTION

WebKit in Apple Safari before 5.1.7 does not properly track state information during the processing of form input, which allows remote attackers to fill in form fields on the pages of arbitrary web sites via unspecified vectors. WebKit is prone to a security-bypass vulnerability. This issue allows a maliciously crafted website to populate form inputs on another website with arbitrary values. Attackers can exploit this issue to bypass security restrictions. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. A security bypass vulnerability exists in WebKit in Apple Safari version 5.1.7. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA47292 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47292/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47292 RELEASE DATE: 2012-05-10 DISCUSS ADVISORY: http://secunia.com/advisories/47292/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47292/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47292 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. 1) Some vulnerabilities are caused due to a bundled vulnerable version of WebKit. This is related to: SA48321 SA48454 (#3) SA48512 (#7) 2) An error related to stage tracking when handling forms can be exploited to populate forms on other websites. The vulnerabilities are reported in versions prior to 5.1.7. SOLUTION: Update to version 5.1.7. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: 2) The vendor credits Tyler Goen, Andreas \xc5kre Solberg, UNINETT AS, and Aaron Roots, Deakin University ITSD. ORIGINAL ADVISORY: http://support.apple.com/kb/HT5282 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-05-09-2 Safari 5.1.7 Safari 5.1.7 is now available and addresses the following: WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.4, OS X Lion Server v10.7.4, Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: Multiple cross-site scripting issues existed in WebKit. CVE-ID CVE-2011-3046 : Sergey Glazunov working with Google's Pwnium contest CVE-2011-3056 : Sergey Glazunov WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.4, OS X Lion Server v10.7.4, Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in WebKit. CVE-ID CVE-2012-0672 : Adam Barth and Abhishek Arya of the Google Chrome Security Team WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.4, OS X Lion Server v10.7.4, Windows 7, Vista, XP SP2 or later Impact: A maliciously crafted website may be able to populate form inputs on another website with arbitrary values Description: A state tracking issue existed in WebKit's handling of forms. This update presents the option to install an updated version of Flash Player from the Adobe website. Safari 5.1.7 is available via the Apple Software Update application, or Apple's Safari download site at: http://www.apple.com/safari/download/ Safari for OS X Lion v10.7.4 The download file is named: Safari5.1.7LionManual.dmg Its SHA-1 digest is: 5024eb2e358feb6b87d6eff15438bf7ae99619b4 Safari for Mac OS X v10.6.8 The download file is named: Safari5.1.7SnowLeopardManual.dmg Its SHA-1 digest is: 32d1dca993b455bc5c230caef95ab70c702e6fee Safari for Windows 7, Vista or XP The download file is named: SafariSetup.exe Its SHA-1 digest is: f601df0106987bfffc3f22b046ba835e4f8d29c6 Safari for Windows 7, Vista or XP from the Microsoft Choice Screen The download file is named: Safari_Setup.exe Its SHA-1 digest is: 193eaddae1d25dd1b0f8786a810de083fc9280b0 Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin) iQEcBAEBAgAGBQJPqtgCAAoJEGnF2JsdZQeeIvQIAIIbdrlsjYRAiMAEK/o4QwkF M4EIDhqpDPnjDFBcT39vqapEPt4btYp0x+464bNRyU9ex4bY7NGPzaKTS/bdcnXJ BbpmR8rFluCRZ3AIyFSYPvKImsoyp5IZ91lTIxes1E4j+ed1diXEpLlt8Pp4K3Fc w2hao+KBKYCUKcjy49whKC0+6jnQWPoP7lPl9gjVyM/fky4K2J/F2c2saXHTDS9l L3CU4+0jA6INzY2NN2j3jdSZgglLgRcDvF3dAriNhW0Wlyd6ucuTxULbC1cS0mRs w4stMTnMzdgKsy13kE2tBQAf3rguM1PzlJAlOZMw9Ad/O6lU+8uaJ8AmBygVpq4= =x2Jz -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2012-0676 // JVNDB: JVNDB-2012-002391 // BID: 53446 // VULHUB: VHN-53957 // VULMON: CVE-2012-0676 // PACKETSTORM: 112603 // PACKETSTORM: 112596

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 1.9

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:5.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 1.6

vendor:applemodel:safariscope:eqversion:5.1.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:5.1.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 1.6

vendor:applemodel:safariscope:eqversion:5.1.5

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:safariscope:lteversion:5.1.6

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 1.0

vendor:applemodel:safariscope:ltversion:5.1.7

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5.1.6

Trust: 0.6

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.5

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.3

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2

Trust: 0.3

vendor:webkitmodel:open source project webkit r82222scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r77705scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52833scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52401scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r51295scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r38566scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r105591scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:2

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.x

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2-1

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:neversion:5.1.7

Trust: 0.3

sources: BID: 53446 // JVNDB: JVNDB-2012-002391 // CNNVD: CNNVD-201205-182 // NVD: CVE-2012-0676

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0676
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0676
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201205-182
value: MEDIUM

Trust: 0.6

VULHUB: VHN-53957
value: MEDIUM

Trust: 0.1

VULMON: CVE-2012-0676
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0676
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-53957
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53957 // VULMON: CVE-2012-0676 // JVNDB: JVNDB-2012-002391 // CNNVD: CNNVD-201205-182 // NVD: CVE-2012-0676

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-53957 // JVNDB: JVNDB-2012-002391 // NVD: CVE-2012-0676

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201205-182

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201205-182

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002391

PATCH

title:HT5282url:http://support.apple.com/kb/HT5282

Trust: 0.8

sources: JVNDB: JVNDB-2012-002391

EXTERNAL IDS

db:NVDid:CVE-2012-0676

Trust: 3.0

db:SECUNIAid:47292

Trust: 1.9

db:SECTRACKid:1027053

Trust: 1.2

db:OSVDBid:81787

Trust: 1.2

db:BIDid:53446

Trust: 1.0

db:JVNDBid:JVNDB-2012-002391

Trust: 0.8

db:CNNVDid:CNNVD-201205-182

Trust: 0.7

db:APPLEid:APPLE-SA-2012-05-09-2

Trust: 0.6

db:NSFOCUSid:19591

Trust: 0.6

db:NSFOCUSid:19596

Trust: 0.6

db:VULHUBid:VHN-53957

Trust: 0.1

db:VULMONid:CVE-2012-0676

Trust: 0.1

db:PACKETSTORMid:112603

Trust: 0.1

db:PACKETSTORMid:112596

Trust: 0.1

sources: VULHUB: VHN-53957 // VULMON: CVE-2012-0676 // BID: 53446 // JVNDB: JVNDB-2012-002391 // PACKETSTORM: 112603 // PACKETSTORM: 112596 // CNNVD: CNNVD-201205-182 // NVD: CVE-2012-0676

REFERENCES

url:http://support.apple.com/kb/ht5282

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2012/may/msg00002.html

Trust: 1.8

url:http://secunia.com/advisories/47292

Trust: 1.8

url:http://osvdb.org/81787

Trust: 1.2

url:http://www.securitytracker.com/id?1027053

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/75474

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0676

Trust: 0.8

url:http://jvn.jp/cert/jvnvu692779

Trust: 0.8

url:http://jvn.jp/cert/jvnvu241779

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0676

Trust: 0.8

url:http://www.securityfocus.com/bid/53446

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19596

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19591

Trust: 0.6

url:http://www.webkit.org/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/apple-safari-cve-2012-0676

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/47292/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47292

Trust: 0.1

url:http://secunia.com/advisories/47292/#comments

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0672

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0676

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://www.apple.com/safari/download/

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3046

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3056

Trust: 0.1

sources: VULHUB: VHN-53957 // VULMON: CVE-2012-0676 // BID: 53446 // JVNDB: JVNDB-2012-002391 // PACKETSTORM: 112603 // PACKETSTORM: 112596 // CNNVD: CNNVD-201205-182 // NVD: CVE-2012-0676

CREDITS

Andreas Akre Solberg of UNINETT AS, Aaron Roots of Deakin University ITSD, Tyler Goe

Trust: 0.9

sources: BID: 53446 // CNNVD: CNNVD-201205-182

SOURCES

db:VULHUBid:VHN-53957
db:VULMONid:CVE-2012-0676
db:BIDid:53446
db:JVNDBid:JVNDB-2012-002391
db:PACKETSTORMid:112603
db:PACKETSTORMid:112596
db:CNNVDid:CNNVD-201205-182
db:NVDid:CVE-2012-0676

LAST UPDATE DATE

2025-04-11T21:57:36.367000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53957date:2017-12-05T00:00:00
db:VULMONid:CVE-2012-0676date:2017-12-05T00:00:00
db:BIDid:53446date:2012-05-09T00:00:00
db:JVNDBid:JVNDB-2012-002391date:2012-05-14T00:00:00
db:CNNVDid:CNNVD-201205-182date:2012-05-14T00:00:00
db:NVDid:CVE-2012-0676date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-53957date:2012-05-11T00:00:00
db:VULMONid:CVE-2012-0676date:2012-05-11T00:00:00
db:BIDid:53446date:2012-05-09T00:00:00
db:JVNDBid:JVNDB-2012-002391date:2012-05-14T00:00:00
db:PACKETSTORMid:112603date:2012-05-10T01:02:05
db:PACKETSTORMid:112596date:2012-05-10T15:24:22
db:CNNVDid:CNNVD-201205-182date:2012-05-11T00:00:00
db:NVDid:CVE-2012-0676date:2012-05-11T03:49:59.340