Page 2 of 10 results (0.006 seconds)

CVSS: 7.8EPSS: 6%CPEs: 3EXPL: 3

The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 allows remote attackers to cause a denial of service (persistent application crash) via a crafted phsh hash attribute in a TXT key. La funcionalidad Bonjour en el mDNSResponder, iChat 3.1.6 y InstantMessage framework 428 en Apple Mac OS X 10.4.8 permite a atacantes remotos provocar una denegación de servicio (caída continua de la aplicación) mediante la manipulación del atributo phsh hash en la clave de un TXT. • https://www.exploit-db.com/exploits/3230 http://docs.info.apple.com/article.html?artnum=305102 http://lists.apple.com/archives/Security-announce/2007/Feb/msg00000.html http://projects.info-pull.com/moab/MOAB-29-01-2007.html http://secunia.com/advisories/23945 http://secunia.com/advisories/24198 http://www.osvdb.org/32713 http://www.securityfocus.com/bid/22304 http://www.securitytracker.com/id?1017661 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 3

The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 does not check for duplicate entries when adding newly discovered available contacts, which allows remote attackers to cause a denial of service (disrupted communication) via a flood of duplicate _presence._tcp mDNS queries. La funcionalidad Bonjour en el mDNSResponder, iChat 3.1.6 y InstantMessage framework 428 en el Apple Mac OS X 10.4.8 no chequea entradas duplicadas cuando se añaden contactos disponibles recién descubiertos, lo que permite a atacantes remotos provocar una denegación de servicio (interrumpir la comunicación) mediante una avalancha de consultas duplicate _presence._tcp mDNS. • https://www.exploit-db.com/exploits/3230 http://projects.info-pull.com/moab/MOAB-29-01-2007.html http://www.osvdb.org/32698 http://www.osvdb.org/32699 http://www.securityfocus.com/bid/22304 •

CVSS: 7.5EPSS: 49%CPEs: 1EXPL: 2

Format string vulnerability in Apple iChat 3.1.6 allows remote attackers to cause a denial of service (null pointer dereference and application crash) and possibly execute arbitrary code via format string specifiers in an aim:// URI. Vulnerabilidad de cadena de formato en Apple iChat 3.1.6 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero nulo y cierre de aplicación) y posiblemente ejecutar código de su elección mediante especificadores de cadena de formato en un URI aim://. • https://www.exploit-db.com/exploits/3166 http://docs.info.apple.com/article.html?artnum=305102 http://lists.apple.com/archives/Security-announce/2007/Feb/msg00000.html http://osvdb.org/32715 http://projects.info-pull.com/moab/MOAB-20-01-2007.html http://secunia.com/advisories/24198 http://www.kb.cert.org/vuls/id/794752 http://www.securityfocus.com/bid/22146 http://www.securitytracker.com/id?1017661 http://www.us-cert.gov/cas/techalerts/TA07-047A.html http:/ •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Apple iChat AV 2.1, AV 2.0, and 1.0.1 allows remote attackers to execute arbitrary programs via a "link" that references the program. • http://lists.apple.com/archives/security-announce/2004/Sep/msg00001.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17420 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

iChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) attack. • http://marc.info/?l=bugtraq&m=90538488231977&w=2 •