ID

VAR-201402-0406


CVE

CVE-2014-1268


TITLE

Apple Safari Used in etc. WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2014-001492

DESCRIPTION

WebKit, as used in Apple Safari before 6.1.2 and 7.x before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1269 and CVE-2014-1270. Apple Safari Used in etc. WebKit is prone to an unspecified memory-corruption vulnerability. An attacker may exploit this issue by enticing victims into viewing a malicious webpage. Successful exploits may allow attackers to execute arbitrary code in the context of the affected browser or cause denial-of-service conditions; other attacks may also be possible. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-02-25-2 Safari 6.1.2 and Safari 7.0.2 Safari 6.1.2 and Safari 7.0.2 is now available and addresses the following: WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.1 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2013-6635 : cloudfuzzer CVE-2014-1268 : Apple CVE-2014-1269 : Apple CVE-2014-1270 : Apple For OS X Mavericks systems, Safari 7.0.2 will be included in OS X Mavericks 10.9.2. For OS X Mountain Lion systems Safari 6.1.2 may be obtained from Mac App Store. For OS X Lion systems Safari 6.1.2 is available via the Apple Software Update application. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJTDNegAAoJEPefwLHPlZEwMjUQAJBWV8XC85kZjDFC7FgHzIln oU9Kc9DNCI9ymv0wfXWBHR07QZrtOugEUC2Wpj7GB/QVjwFUlLs0/yU7tddHiMif D/OsqSNB1Y7n2Le1fzgQbaiNo56oTNFLs/+hivTp6Wgv8ScJ421V9PfSfN8qK1BY cqhXuReuB5tiuwYgNcnT803sUWu8aG2IVSZE4uUXgivEC7zXTAXtfXXMbeV8q76W yyvwiTZ0RkQi4bto0Xgie01MbFCJMmcdXHjTRq6o+P4aMYcjqTgaMEwChxM7S2JC fI24bn6CTBpH8fAHj/b7dMgHMp8TVGmwC7XVQroMnyrK5QBovHjym40qK7Sn8A1o GotUP6hyniAFChLSDlZqskR5DKJIQwL65wIJMpANA37TtRjvWvDmFj2fCTO4fg/A WSbRsks0HXWjSZcsi4UK4BsOADeac/FxAPFIo6biZLGacP1Gb3i/fIuTlvSLGkxH T1HvJDtLt5qMO56De3DeGN2HChle6TPGCZIZuGnjm/1mOFpr6ncPgUWExvOc46pJ ElLoLtZoePttEL8KS6iPrEXvmjfw92GTkCYd9AGbKefx3UrIZJeOuaoNMDBBWJrR wHEz9wECF18LqhdhmnVCsFwAnUmMm6BfQrdaIOXYdvkT6tudbOYyYJ2E3G7U9GVR vgHI3c7JfmZu/ocYgqGm =DVSA -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2014-1268 // JVNDB: JVNDB-2014-001492 // BID: 65778 // VULHUB: VHN-69207 // PACKETSTORM: 125428

AFFECTED PRODUCTS

vendor:applemodel:mac os x serverscope:eqversion:10.7.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.8.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.9.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.8.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.8.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.9

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.8.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.8.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.7.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.7.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.7.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:safariscope:lteversion:6.1.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.7.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.7.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.7.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.7.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.7.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.7.3

Trust: 1.0

vendor:applemodel:webkitscope:eqversion:*

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.7.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.7.5

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:(windows)

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.4

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mavericks v10.9.1)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.9.1

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.0

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8.1

Trust: 0.8

vendor:applemodel:webkitscope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8.2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8.0

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.3

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8.5 supplemental update

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.4

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8.4

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mavericks v10.9.1)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8.3

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.3

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.1

Trust: 0.8

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.0

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.9

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.5

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:12.0.1

Trust: 0.8

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.5

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.3

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:2

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2-1

Trust: 0.3

vendor:esignalmodel:esignalscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.2.72

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

sources: BID: 65778 // JVNDB: JVNDB-2014-001492 // CNNVD: CNNVD-201402-457 // NVD: CVE-2014-1268

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1268
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-1268
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201402-457
value: MEDIUM

Trust: 0.6

VULHUB: VHN-69207
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-1268
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-69207
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69207 // JVNDB: JVNDB-2014-001492 // CNNVD: CNNVD-201402-457 // NVD: CVE-2014-1268

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-69207 // JVNDB: JVNDB-2014-001492 // NVD: CVE-2014-1268

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201402-457

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201402-457

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001492

PATCH

title:APPLE-SA-2014-02-25-2url:http://lists.apple.com/archives/security-announce/2014/Feb/msg00001.html

Trust: 0.8

title:HT6537url:http://support.apple.com/en-eu/HT6537

Trust: 0.8

title:HT6145url:http://support.apple.com/kb/HT6145

Trust: 0.8

title:HT6145url:http://support.apple.com/kb/HT6145?viewlocale=ja_JP

Trust: 0.8

title:HT6537url:http://support.apple.com/ja-jp/HT6537

Trust: 0.8

sources: JVNDB: JVNDB-2014-001492

EXTERNAL IDS

db:NVDid:CVE-2014-1268

Trust: 3.0

db:JVNid:JVNVU98302748

Trust: 0.8

db:JVNid:JVNVU97537282

Trust: 0.8

db:JVNDBid:JVNDB-2014-001492

Trust: 0.8

db:CNNVDid:CNNVD-201402-457

Trust: 0.7

db:SECUNIAid:57093

Trust: 0.6

db:BIDid:65778

Trust: 0.4

db:SEEBUGid:SSVID-61579

Trust: 0.1

db:VULHUBid:VHN-69207

Trust: 0.1

db:PACKETSTORMid:128734

Trust: 0.1

db:PACKETSTORMid:125428

Trust: 0.1

sources: VULHUB: VHN-69207 // BID: 65778 // JVNDB: JVNDB-2014-001492 // PACKETSTORM: 128734 // PACKETSTORM: 125428 // CNNVD: CNNVD-201402-457 // NVD: CVE-2014-1268

REFERENCES

url:http://support.apple.com/kb/ht6145

Trust: 1.7

url:https://support.apple.com/kb/ht6537

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1268

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98302748/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97537282/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1268

Trust: 0.8

url:http://secunia.com/advisories/57093

Trust: 0.6

url:http://www.apple.com/safari/download/

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1269

Trust: 0.2

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1270

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1268

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-6635

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1291

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1300

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2927

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1298

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5198

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1290

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1294

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1289

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1299

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5225

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5197

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2871

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5199

Trust: 0.1

sources: VULHUB: VHN-69207 // BID: 65778 // JVNDB: JVNDB-2014-001492 // PACKETSTORM: 128734 // PACKETSTORM: 125428 // CNNVD: CNNVD-201402-457 // NVD: CVE-2014-1268

CREDITS

Apple

Trust: 0.5

sources: BID: 65778 // PACKETSTORM: 128734 // PACKETSTORM: 125428

SOURCES

db:VULHUBid:VHN-69207
db:BIDid:65778
db:JVNDBid:JVNDB-2014-001492
db:PACKETSTORMid:128734
db:PACKETSTORMid:125428
db:CNNVDid:CNNVD-201402-457
db:NVDid:CVE-2014-1268

LAST UPDATE DATE

2025-04-13T20:29:22.173000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69207date:2016-12-08T00:00:00
db:BIDid:65778date:2015-03-19T08:10:00
db:JVNDBid:JVNDB-2014-001492date:2014-11-20T00:00:00
db:CNNVDid:CNNVD-201402-457date:2014-04-04T00:00:00
db:NVDid:CVE-2014-1268date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-69207date:2014-02-27T00:00:00
db:BIDid:65778date:2014-02-25T00:00:00
db:JVNDBid:JVNDB-2014-001492date:2014-02-28T00:00:00
db:PACKETSTORMid:128734date:2014-10-17T15:14:05
db:PACKETSTORMid:125428date:2014-02-26T22:24:01
db:CNNVDid:CNNVD-201402-457date:2014-02-27T00:00:00
db:NVDid:CVE-2014-1268date:2014-02-27T01:55:04.163