Page 252 of 1392 results (0.021 seconds)

CVSS: 4.3EPSS: 0%CPEs: 73EXPL: 2

Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms, allows remote attackers to inject arbitrary web script or HTML via vectors related to parent and top objects. Una vulnerabilidad de tipo cross-site scripting (XSS) en WebKit en Safari de Apple anterior a versión 4.0.2, tal y como es usado en iPhone OS anterior a versión 3.1, iPhone OS anterior a versión 3.1.1 para iPod touch, y otras plataformas, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio de vectores relacionados con los objetos primarios y superiores. • https://www.exploit-db.com/exploits/33047 http://lists.apple.com/archives/security-announce/2009/Jul/msg00000.html http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://osvdb.org/55738 http://secunia.com/advisories/35758 http://secunia.com/advisories/36677 http://secunia.com/advisories/43068 http://support.apple.com/kb/HT3666 http://support.apple.com/kb/HT3860 http://www&# • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 3%CPEs: 73EXPL: 0

WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. WebKit en Apple Safari anterior a v4.0.2, no maneja adecuadamente las referencias de caracteres numéricos, lo que permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (corrupción de memoria y caída de aplicación) a través de un documento HTML manipulado. • http://lists.apple.com/archives/security-announce/2009/Jul/msg00000.html http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://osvdb.org/55739 http://secunia.com/advisories/35758 http://secunia.com/advisories/36057 http://secunia.com/advisories/36062 http://secunia.com/advisories/36347 http://secunia.com/advisories/36677 http://secunia.com/advisories/36790 http://secunia.com/advi • CWE-189: Numeric Errors •

CVSS: 5.8EPSS: 0%CPEs: 2EXPL: 0

Apple Safari 3.2.3 does not properly implement the file: protocol handler, which allows remote attackers to read arbitrary files or cause a denial of service (launch of multiple Windows Explorer instances) via vectors involving an unspecified HTML tag, possibly a related issue to CVE-2009-1703. Apple Safari v3.2.3 no implementa correctamente el manejador de protocolo file: , lo cual permite a atacantes remotos leer ficheros arbitrarios o provocar una denegación de servicio (lanzar múltiples instancias del Explorador de Windows) a través de vectores reaccionados con una etiqueta HTML no especificada, posiblemente una incidencia relacionada con CVE-2009-1703. • http://www.securityfocus.com/archive/1/504480/100/0/threaded http://www.securityfocus.com/bid/35482 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 22%CPEs: 2EXPL: 3

Use-after-free vulnerability in the servePendingRequests function in WebCore in WebKit in Apple Safari 4.0 and 4.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted HTML document that references a zero-length .js file and the JavaScript reload function. NOTE: some of these details are obtained from third party information. Vulnerabilidad de uso-después-de-liberación en la función servePendingRequests en WebCore en WebKit en Apple Safari v4.0 y v4.0.1 permite a atacantes remotos provocar una denegación de servicio (cuelgue de aplicación) o posiblemente ejecutar código arbitrario a través de un documento HTML elaborado que hace referencia a un fichero .js de longitud cero y la función JavaScript recarga (reload). NOTA: algunos de estos detalles se obtienen a partir de información de terceros. • https://www.exploit-db.com/exploits/33062 http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://marcell-dietl.de/index/adv_safari_4_x_js_reload_dos.php http://secunia.com/advisories/33495 http://secunia.com/advisories/43068 http://trac.webkit.org/changeset/44519 http://www.osvdb.org/55587 http://www.securityfocus.com/bid/35555 http://www.vupen.com/english/advisories/2011/0212 https://exchange.xforce.ibmcloud.com/vulnerabilities/51533 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The CFCharacterSetInitInlineBuffer method in CoreFoundation.dll in Apple Safari 3.2.3 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a "high-bit character" in a URL fragment for an unspecified protocol. El método CFCharacterSetInitInlineBuffer en CoreFoundation.dll en Apple Safari v3.2.3 permite a atacantes remotos causar una denegación de servicio (desreferencia a puntero nulo y cuelgue de la aplicación) o posiblemente ejecutar código a su elección a través de un "caracter bit-alto" en un fragmento de una URL para un protocolo sin especificar. • http://www.securityfocus.com/archive/1/504479/100/0/threaded http://www.securityfocus.com/bid/35481 • CWE-20: Improper Input Validation •