{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T14:40:07.976","vulnerabilities":[{"cve":{"id":"CVE-2008-0989","sourceIdentifier":"cve@mitre.org","published":"2008-03-18T23:44:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in mDNSResponderHelper in Apple Mac OS X 10.5.2 allows local users to execute arbitrary code via format string specifiers in the local hostname."},{"lang":"es","value":"Vulnerabilidad de formato de cadena en mDNSResponderHelper en Apple Mac OS X 10.5.2, permite a usuarios locales ejecutar código de su elección a través de especificadores de formatos de cadena en el hostname local."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-134"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*","matchCriteriaId":"B3267A41-1AE0-48B8-BD1F-DEC8A212851A"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*","matchCriteriaId":"C73BED9E-29FB-4965-B38F-013FFE5A9170"}]}]}],"references":[{"url":"http://docs.info.apple.com/article.html?artnum=307562","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/29420","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/28304","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/28339","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1019662","source":"cve@mitre.org"},{"url":"http://www.us-cert.gov/cas/techalerts/TA08-079A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2008/0924/references","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41292","source":"cve@mitre.org"},{"url":"http://docs.info.apple.com/article.html?artnum=307562","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://secunia.com/advisories/29420","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/28304","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/28339","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1019662","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA08-079A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2008/0924/references","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41292","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}