{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T00:14:45.175","vulnerabilities":[{"cve":{"id":"CVE-2011-3449","sourceIdentifier":"product-security@apple.com","published":"2012-02-02T18:55:01.207","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in CoreText in Apple Mac OS X before 10.7.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted embedded font in a document."},{"lang":"es","value":"Una vulnerabilidad de uso después de liberación en CoreText en Apple Mac OS X antes de v10.7.3 permite a atacantes remotos ejecutar código de su elección o causar una denegación de servicio (caída de aplicación) a través de una fuente de letra manipulada en un documento."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","versionEndIncluding":"10.7.2","matchCriteriaId":"B52C3912-5F34-4C5C-9B02-953C5DE8DE49"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*","matchCriteriaId":"8961F444-48C4-4B54-829B-A1A2D0F2716C"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*","matchCriteriaId":"09A0FA11-6211-4962-A6E0-F00732818012"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*","versionEndIncluding":"10.7.2","matchCriteriaId":"19E02215-21EA-41A7-B977-01CE5CB2424F"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*","matchCriteriaId":"38823717-65A1-4587-8F05-32EA9A01084C"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*","matchCriteriaId":"7BD4E77C-3F87-476B-BB66-75EECDFDB18E"}]}]}],"references":[{"url":"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"http://support.apple.com/kb/HT5130","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://support.apple.com/kb/HT5130","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}