{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T12:46:55.578","vulnerabilities":[{"cve":{"id":"CVE-2007-0646","sourceIdentifier":"cve@mitre.org","published":"2007-02-01T00:28:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in iMovie HD 6.0.3, and Safari in Apple Mac OS X 10.4 through 10.4.10, allows remote user-assisted attackers to cause a denial of service (crash) via format string specifiers in a filename, which is not properly handled when calling the NSRunCriticalAlertPanel Apple AppKit function."},{"lang":"es","value":"Una vulnerabilidad de cadena de formato en iMovie HD versión 6.0.3 y Safari en Apple Mac OS X versiones 10.4 hasta 10.4.10,  permite a atacantes remotos asistidos por el usuario causar una denegación de servicio (bloqueo de aplicación) por medio de los especificadores de cadena de formato en un nombre de archivo, que no es manejado apropiadamente cuando llaman a la función NSRunCriticalAlertPanel de Apple AppKit."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-134"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*","matchCriteriaId":"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*","matchCriteriaId":"AFD4DE58-46C7-4E69-BF36-C5FD768B8248"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*","matchCriteriaId":"CF824694-52DE-44E3-ACAD-60B2A84CD3CE"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*","matchCriteriaId":"B73A0891-A37A-4E0D-AA73-B18BFD6B1447"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*","matchCriteriaId":"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*","matchCriteriaId":"0C580935-0091-4163-B747-750FB7686973"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*","matchCriteriaId":"BB0F2132-8431-4CEF-9A3D-A69425E3834E"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*","matchCriteriaId":"8719F3C4-F1DE-49B5-9301-22414A2B6F9C"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*","matchCriteriaId":"09ED46A8-1739-411C-8807-2A416BDB6DFE"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*","matchCriteriaId":"786BB737-EA99-4EC6-B742-0C35BF2453F9"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*","matchCriteriaId":"8D089858-3AF9-4B82-912D-AA33F25E3715"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:imovie:6.0.3:*:*:*:*:*:*:*","matchCriteriaId":"8AD7C458-922B-474D-8A7A-EDDB5CB4029D"},{"vulnerable":true,"criteria":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","matchCriteriaId":"AE370CAA-04B3-434E-BD5B-1D87DE596C10"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*","matchCriteriaId":"DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69"}]}]}],"references":[{"url":"http://docs.info.apple.com/article.html?artnum=305391","source":"cve@mitre.org"},{"url":"http://docs.info.apple.com/article.html?artnum=307041","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/24966","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/27643","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.digitalmunition.com/MOAB-30-01-2007.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/22326","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/26444","source":"cve@mitre.org"},{"url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA07-319A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2007/1470","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2007/3868","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://docs.info.apple.com/article.html?artnum=305391","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://docs.info.apple.com/article.html?artnum=307041","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/24966","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/27643","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.digitalmunition.com/MOAB-30-01-2007.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/22326","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/26444","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA07-319A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2007/1470","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2007/3868","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}