Page 181 of 915 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Apple iTunes before 8.1 does not properly inform the user about the origin of an authentication request, which makes it easier for remote podcast servers to trick a user into providing a username and password when subscribing to a crafted podcast. Apple iTunes antes de la versión 8.1 no informa adecuadamente al usuario sobre el origen de una solicitud de autenticación, lo que facilita a los servidores podcast remotos a engañar a un usuario para que proporcione su nombre de usuario y contraseña al suscribirse a un podcast debidamente modificado. • http://lists.apple.com/archives/security-announce//2009/Mar/msg00001.html http://osvdb.org/52579 http://secunia.com/advisories/34254 http://securitytracker.com/id?1021843 http://support.apple.com/kb/HT3487 http://www.securityfocus.com/bid/34094 http://www.vupen.com/english/advisories/2009/0702 https://exchange.xforce.ibmcloud.com/vulnerabilities/49201 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5336 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 26%CPEs: 80EXPL: 0

Apple iTunes before 8.1 on Windows allows remote attackers to cause a denial of service (infinite loop) via a Digital Audio Access Protocol (DAAP) message with a crafted Content-Length header. Apple iTunes antes de la versión 8.1 sobre Windows permite a atacantes remotos provocar una denegación de servicio (mediante un bucle infinito) a través de un mensaje del Protocolo de acceso de audio digital (DAAP) con la cabecera Content-Length debidamente modificada. • http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0236.html http://lists.apple.com/archives/security-announce//2009/Mar/msg00001.html http://osvdb.org/52578 http://secunia.com/advisories/34254 http://securitytracker.com/id?1021842 http://support.apple.com/kb/HT3487 http://www.fortiguardcenter.com/advisory/FGA-2009-11.html http://www.securityfocus.com/archive/1/501758/100/0/threaded http://www.securityfocus.com/bid/34094 http://www.vupen.com/english/advisories/200 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 4%CPEs: 2EXPL: 1

Stack-based buffer overflow in Apple QuickTime Player 7.5.5 and iTunes 8.0.2.20 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a MOV file with "long arguments," related to an "off by one overflow." Desbordamiento de búfer basado en pila en Apple QuickTime Player 7.5.5 e iTunes 8.0.2.20, permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) y probablemente la ejecución de código de su elección a través de un archivo MOV con "una argumento largo". Relacionado con un "error de superación de límite (off-by-one)". • https://www.exploit-db.com/exploits/7296 http://securityreason.com/securityalert/4704 http://www.securityfocus.com/bid/32540 https://exchange.xforce.ibmcloud.com/vulnerabilities/46984 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 8%CPEs: 2EXPL: 1

Buffer overflow in Apple QuickTime 7.5.5 and iTunes 8.0 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long type attribute in a quicktime tag (1) on a web page or embedded in a (2) .mp4 or (3) .mov file, possibly related to the Check_stack_cookie function and an off-by-one error that leads to a heap-based buffer overflow. Un desbordamiento del búfer en QuickTime versión 7.5.5 y iTunes versión 8.0, de Apple, permite a los atacantes remotos causar una denegación de servicio (bloqueo del navegador) o posiblemente ejecutar código arbitrario por medio de un atributo type largo en una etiqueta de quicktime (1) en una página web o insertado en un archivo ( 2) .mp4 o (3) .mov, posiblemente relacionado con la función Check_stack_cookie y un error por un paso que conduce a un desbordamiento del búfer en la región heap de la memoria. • https://www.exploit-db.com/exploits/6471 http://securityreason.com/securityalert/4270 http://www.securityfocus.com/bid/31212 https://exchange.xforce.ibmcloud.com/vulnerabilities/45311 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5936 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6113 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7995 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 43EXPL: 0

Integer overflow in the IopfCompleteRequest API in the kernel in Microsoft Windows 2000, XP, Server 2003, and Vista allows context-dependent attackers to gain privileges. NOTE: this issue was originally reported for GEARAspiWDM.sys 2.0.7.5 in Gear Software CD DVD Filter driver before 4.001.7, as used in other products including Apple iTunes and multiple Symantec and Norton products, which allows local users to gain privileges via repeated IoAttachDevice IOCTL calls to \\.\GEARAspiWDMDevice in this GEARAspiWDM.sys. However, the root cause is the integer overflow in the API call itself. Desbordamiento de entero en un driver de terceros no especificado incluido en Apple iTunes anterior a la 8.0 para Windows, permite a usuarios locales obtener privilegios a través de vectores desconocidos. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00001.html http://securityresponse.symantec.com/avcenter/security/Content/2008.10.07a.html http://securitytracker.com/id?1020839 http://support.apple.com/kb/HT3025 http://www.gearsoftware.com/support/GEARAspi%20Security%20Information.pdf http://www.kb.cert.org/vuls/id/146896 http://www.securityfocus.com/archive/1/497131/100/0/threaded http://www.securityfocus.com/bid/31089 http://www.securitytracker.com/id?1020997 http:& • CWE-189: Numeric Errors •