Page 43 of 218 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 35EXPL: 0

AFP Server on Mac OS X 10.3.x to 10.3.5, when a guest has mounted an AFP volume, allows the guest to "terminate authenticated user mounts" via modified SessionDestroy packets. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.securityfocus.com/bid/11322 •

CVSS: 5.0EPSS: 0%CPEs: 35EXPL: 0

AFP Server on Mac OS X 10.3.x to 10.3.5, under certain conditions, does not properly set the guest group ID, which causes AFP to change a write-only AFP Drop Box to be read-write when the Drop Box is on a share that is mounted by a guest, which allows attackers to read the Drop Box. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.securityfocus.com/bid/11322 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Integer overflow on Apple QuickTime before 6.5.2, when running on Windows systems, allows remote attackers to cause a denial of service (memory consumption) via certain inputs that cause a large memory operation. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00001.html •

CVSS: 5.1EPSS: 6%CPEs: 1EXPL: 0

Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to execute arbitrary code via a large "number of entries" field in the sample-to-chunk table data for a .mov movie file, which leads to a heap-based buffer overflow. Desbordamiento de enteros en Apple QuickTime (QuickTime.qts) anteriores a 6.5.1 permite a atacantes ejecutar código de se elección mediante un "número de entradas" grande en la tabla de datos sample-to-chunk de un fichero de película .mov, lo que lleva un desbordamiento de búfer basado en el montón. • http://lists.apple.com/mhonarc/security-announce/msg00048.html http://marc.info/?l=bugtraq&m=108360110618389&w=2 http://marc.info/?l=ntbugtraq&m=108356485013237&w=2 http://www.kb.cert.org/vuls/id/782958 https://exchange.xforce.ibmcloud.com/vulnerabilities/16026 •

CVSS: 7.5EPSS: 11%CPEs: 2EXPL: 1

Buffer overflow in Apple QuickTime Player 5.x and 6.0 for Windows allows remote attackers to execute arbitrary code via a long QuickTime URL. Apple QuickTime Player 5.x y 6.0 para Windows, permiten a atacantes remotos la ejecución arbitraria de código mediante una URL QuickTime adecuada. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0166.html http://lists.apple.com/mhonarc/security-announce/msg00027.html http://www.idefense.com/advisory/03.31.03.txt http://www.kb.cert.org/vuls/id/112553 http://www.osvdb.org/10561 http://www.securityfocus.com/archive/1/317141/30/25220/threaded http://www.securityfocus.com/archive/1/317148/30/25220/threaded http://www.securityfocus.com/bid/7247 https://exchange.xforce.ibmcloud.com/vulnerabilities/11671 •