Page 328 of 1649 results (0.009 seconds)

CVSS: 6.8EPSS: 0%CPEs: 12EXPL: 0

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1. WebKit, de la manera en que se utiliza en Apple Safari anteriores a 6.1.1 y 7.x anteriores a 7.0.1, permite a atacantes remotos ejecutar código arbitrario o causar denegación de servicio (corrupción de memoria y caída de la aplicación) a través de una página web manipulada, una vulnerabilidad distinta a otros CVEs de WebKit listados en APPLE-SA-2013-12-16-1. • http://archives.neohapsis.com/archives/bugtraq/2013-12/0086.html http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html http://support.apple.com/kb/HT6162 http://support.apple.com/kb/HT6163 https://support.apple.com/kb/HT6537 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 0%CPEs: 12EXPL: 0

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1. WebKit, de la manera en que se utiliza en Apple Safari anteriores a 6.1.1 y 7.x anteriores a 7.0.1, permite a atacantes remotos ejecutar código arbitrario o causar denegación de servicio (corrupción de memoria y caída de la aplicación) a través de una página web manipulada, una vulnerabilidad distinta a otros CVEs de WebKit listados en APPLE-SA-2013-12-16-1. • http://archives.neohapsis.com/archives/bugtraq/2013-12/0086.html http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html http://support.apple.com/kb/HT6162 http://support.apple.com/kb/HT6163 https://support.apple.com/kb/HT6537 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 3%CPEs: 12EXPL: 0

WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1. WebKit, de la manera en que se utiliza en Apple Safari anteriores a 6.1.1 y 7.x anteriores a 7.0.1, permite a atacantes remotos ejecutar código arbitrario o causar denegación de servicio (corrupción de memoria y caída de la aplicación) a través de una página web manipulada, una vulnerabilidad distinta a otros CVEs de WebKit listados en APPLE-SA-2013-12-16-1. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of WebCore::DocumentOrderedMap objects. By manipulating a document's elements an attacker can free arbitrary memory and force a dangling pointer to be reused after it has been freed. • http://archives.neohapsis.com/archives/bugtraq/2013-12/0086.html http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html http://support.apple.com/kb/HT6162 http://support.apple.com/kb/HT6163 https://support.apple.com/kb/HT6537 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 101EXPL: 0

The IOUSBDeviceFamily driver in the USB implementation in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 accesses pipe object pointers that originated in userspace, which allows local users to gain privileges via crafted code. El controlador IOUSBDeviceFamily en la implementación USB del kernel en Apple iOS anterior a 6.1.3 y Apple TV anterior a la 5.2.1, accede a los punteros de los "pipe object" que se originan en el espacio de usuario, lo que permite a usuarios locales obtener privilegios a través de un código manipulado. • http://lists.apple.com/archives/security-announce/2013/Mar/msg00004.html http://lists.apple.com/archives/security-announce/2013/Mar/msg00005.html http://support.apple.com/kb/HT5702 http://support.apple.com/kb/HT5704 •

CVSS: 4.6EPSS: 0%CPEs: 101EXPL: 0

dyld in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not properly manage the state of file loading for Mach-O executable files, which allows local users to bypass intended code-signing requirements via a file that contains overlapping segments. dyld en Apple iOS y Apple TV a v6.1.3 y Apple TV anterior a v5.2.1, ni gestiona adecuadamente el estado de carga de un archivo ejecutable para los del tipo "Mach-O", lo que permite a usuarios locales evitar los requerimientos de "Code-signing" a través de un archivo que contiene segmentos sobrepuestos. • http://lists.apple.com/archives/security-announce/2013/Mar/msg00004.html http://lists.apple.com/archives/security-announce/2013/Mar/msg00005.html http://support.apple.com/kb/HT5702 http://support.apple.com/kb/HT5704 •