CVE-2011-3246
https://notcve.org/view.php?id=CVE-2011-3246
CFNetwork in Apple iOS before 5.0.1 and Mac OS X 10.7 before 10.7.2 does not properly parse URLs, which allows remote attackers to trigger visits to unintended web sites, and transmission of cookies to unintended web sites, via a crafted (1) http or (2) https URL. CFNetwork en iOS anterior a versión 5.0.1 y Mac OS X versión 10.7 anterior a 10.7.2 de Apple, no analiza apropiadamente las URL, lo que permite a los atacantes remotos desencadenar visitas a sitios web no deseados, y la transmisión de cookies a sitios web no deseados, por medio de una URL de 1) http o (2) https diseñada sin hacer uso de la aplicación. • http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://support.apple.com/kb/HT4999 http://support.apple.com/kb/HT5002 http://support.apple.com/kb/HT5052 http://support.apple.com/kb/HT5130 http://www.securityfocus.com/bid/50085 h • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-3225
https://notcve.org/view.php?id=CVE-2011-3225
The SMB File Server component in Apple Mac OS X 10.7 before 10.7.2 does not prevent all guest users from accessing the share point record of a guest-restricted folder, which allows remote attackers to bypass intended browsing restrictions by leveraging access to the nobody account. El componente SMB File Server en Apple Mac OS X v10.7 antes de v10.7.2 no impide que todos los usuarios invitados accedan al registro de punto de uso compartido de una carpeta de invitados restringida, lo que permite a atacantes remotos evitar las restricciones de navegación destinadas a aprovechar el acceso a la cuenta "nobody". • http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://osvdb.org/76376 http://support.apple.com/kb/HT5002 http://www.securityfocus.com/bid/50085 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-3214
https://notcve.org/view.php?id=CVE-2011-3214
IOGraphics in Apple Mac OS X through 10.6.8 does not properly handle a locked-screen state in display sleep mode for an Apple Cinema Display, which allows physically proximate attackers to bypass the password requirement via unspecified vectors. IOGraphics en Apple Mac OS X hasta v10.6.8 no maneja adecuadamente un estado de pantalla bloquedad en modo sleep para un Apple Cinema Display, lo que permite a atacantes próximos físicamente evitar los requerimientos de contraseña a través de vectores no especificados. • http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://support.apple.com/kb/HT5002 http://www.securityfocus.com/bid/50085 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-3435
https://notcve.org/view.php?id=CVE-2011-3435
Open Directory in Apple Mac OS X 10.7 before 10.7.2 allows local users to read the password data of arbitrary users via unspecified vectors. Open Directory en Apple Mac OS X v10.7 antes de v10.7.2 permite a usuarios locales leer los datos de la contraseña de los usuarios de su elección a través de vectores no especificados. • http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://osvdb.org/76369 http://support.apple.com/kb/HT5002 http://www.securityfocus.com/bid/50085 https://exchange.xforce.ibmcloud.com/vulnerabilities/70584 • CWE-255: Credentials Management Errors •
CVE-2011-3436
https://notcve.org/view.php?id=CVE-2011-3436
Open Directory in Apple Mac OS X 10.7 before 10.7.2 does not require a user to provide the current password before changing this password, which allows remote attackers to bypass intended password-change restrictions by leveraging an unattended workstation. Open Directory en Apple Mac OS X v10.7 antes v10.7.2 no requiere que el usuario proporcione el password actual antes de cambiar la contraseña, lo que permite a atacantes remotos evitar restricciones intencionadas de cambio de contraseña aprovechando una estación de trabajo sin supervisión. • http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://osvdb.org/76370 http://support.apple.com/kb/HT5002 http://www.securityfocus.com/bid/50085 https://exchange.xforce.ibmcloud.com/vulnerabilities/70585 • CWE-264: Permissions, Privileges, and Access Controls •