{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T11:06:04.791","vulnerabilities":[{"cve":{"id":"CVE-2009-2191","sourceIdentifier":"cve@mitre.org","published":"2009-08-06T16:30:00.390","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in Login Window in Apple Mac OS X 10.4.11 and 10.5 before 10.5.8 allows attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in an application name."},{"lang":"es","value":"Vulnerabilidad de formato de cadena en la ventana de inicio de sesión (Login Window) en Apple Mac OS X v10.4.11 y v10.5 anterior a v10.5.8 permite a atacantes ejecutar código arbitrario o causar una denegación de servicio (cuelgue de aplicación) a través de especificadores de formato de cadena en un nombre de aplicación."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-134"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*","matchCriteriaId":"AA12DDA2-6B31-4BB2-BDAC-8DDB7726491D"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*","matchCriteriaId":"6EE39585-CF3B-4493-96D8-B394544C7643"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*","matchCriteriaId":"D2442D35-7484-43D8-9077-3FDF63104816"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*","matchCriteriaId":"2398ADC8-A106-462E-B9AE-F8AF800D0A3C"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*","matchCriteriaId":"D09D5933-A7D9-4A61-B863-CD8E7D5E67D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*","matchCriteriaId":"C147E866-B80F-4FFA-BBE8-19E84A46DB1C"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*","matchCriteriaId":"8EC681A4-6F58-4C7D-B4E0-FCC1BCBC534E"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*","matchCriteriaId":"ADF94705-562C-4EC8-993E-1AD88F01549C"}]}]}],"references":[{"url":"http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://osvdb.org/56840","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/36096","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://support.apple.com/kb/HT3757","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/35954","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-218A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/2172","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/52428","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://osvdb.org/56840","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/36096","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://support.apple.com/kb/HT3757","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/35954","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA09-218A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2009/2172","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/52428","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}