2 results (0.003 seconds)

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

Apple Software Update before 2.2 on Windows does not use HTTPS, which makes it easier for man-in-the-middle attackers to spoof updates by modifying the client-server data stream. Apple Software Update en versiones anteriores a 2.2 en Windows no utiliza HTTPS, lo que facilita a atacantes man-in-the-middle suplantar actualizaciones modificando el flujo de datos cliente-servidor. • http://www.securityfocus.com/bid/84283 http://www.securitytracker.com/id/1035256 https://support.apple.com/kb/HT206091 • CWE-310: Cryptographic Issues CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 5.0EPSS: 39%CPEs: 1EXPL: 2

Format string vulnerability in Apple Software Update 2.0.5 on Mac OS X 10.4.8 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via format string specifiers in (1) SWUTMP or (2) SUCATALOG filenames, or using the (3) application/x-apple.sucatalog+xml MIME type. Vulnerabilidad de cadena de formato en Apple Software Update 2.0.5 de Mac OS X 10.4.8 permite a atacantes remotos provocar una denegación de servicio (cierre de aplicación) o ejecutar código de su elección mediante especificadores de cadena de formato en nombres de archivo (1) SWUTMP o (2) SUCATALOG, o utilizando el tipo MIME (3) application/x-apple.sucatalog+xml. • https://www.exploit-db.com/exploits/29523 http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/moab/MOAB-24-01-2007.html http://secunia.com/advisories/24479 http://www.osvdb.org/32703 http://www.securityfocus.com/bid/22222 http://www.securitytracker.com/id?1017755 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/03 •