{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:16:40.418","vulnerabilities":[{"cve":{"id":"CVE-2007-4671","sourceIdentifier":"cve@mitre.org","published":"2007-09-27T22:17:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Safari in Apple iPhone 1.1.1, and Safari 3 before Beta Update 3.0.4 on Windows and Mac OS X 10.4 through 10.4.10, allows remote attackers to \"alter or access\" HTTPS content via an HTTP session with a crafted web page that causes Javascript to be applied to HTTPS pages from the same domain."},{"lang":"es","value":"Una vulnerabilidad no especificada de Safari en Apple iPhone versiones anteriores a 1.1.1 y Safari versión 3 anterior a Beta Update 3.0.4 en Windows y Mac OS X versiones 10.4 hasta 10.4.10, permite a atacantes remotos  \"alter or access\" al contenido HTTPS por medio de una sesión HTTP con una página web diseñada que causa que Javascript sea aplicado a páginas HTTPS del mismo dominio."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"27319629-171F-42AA-A95F-2D71F78097D0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","matchCriteriaId":"AE370CAA-04B3-434E-BD5B-1D87DE596C10"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*","matchCriteriaId":"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*","matchCriteriaId":"AFD4DE58-46C7-4E69-BF36-C5FD768B8248"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*","matchCriteriaId":"CF824694-52DE-44E3-ACAD-60B2A84CD3CE"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*","matchCriteriaId":"B73A0891-A37A-4E0D-AA73-B18BFD6B1447"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*","matchCriteriaId":"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*","matchCriteriaId":"0C580935-0091-4163-B747-750FB7686973"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*","matchCriteriaId":"BB0F2132-8431-4CEF-9A3D-A69425E3834E"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*","matchCriteriaId":"8719F3C4-F1DE-49B5-9301-22414A2B6F9C"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*","matchCriteriaId":"09ED46A8-1739-411C-8807-2A416BDB6DFE"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*","matchCriteriaId":"786BB737-EA99-4EC6-B742-0C35BF2453F9"},{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*","matchCriteriaId":"8D089858-3AF9-4B82-912D-AA33F25E3715"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*","matchCriteriaId":"3852BB02-47A1-40B3-8E32-8D8891A53114"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*","matchCriteriaId":"E61F1C9B-44AF-4B35-A7B2-948EEF7639BD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0.3","matchCriteriaId":"5CB75258-E523-4F5A-BE8C-436CB4D68447"}]}]}],"references":[{"url":"http://docs.info.apple.com/article.html?artnum=306586","source":"cve@mitre.org"},{"url":"http://docs.info.apple.com/article.html?artnum=307041","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce/2007/Sep/msg00001.html","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/26983","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/27643","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://securitytracker.com/id?1018752","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/25852","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/26444","source":"cve@mitre.org"},{"url":"http://www.us-cert.gov/cas/techalerts/TA07-319A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2007/3287","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2007/3868","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36862","source":"cve@mitre.org"},{"url":"http://docs.info.apple.com/article.html?artnum=306586","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://docs.info.apple.com/article.html?artnum=307041","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/security-announce/2007/Sep/msg00001.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://secunia.com/advisories/26983","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/27643","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://securitytracker.com/id?1018752","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/25852","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/26444","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA07-319A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2007/3287","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2007/3868","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36862","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}