Page 436 of 2914 results (0.019 seconds)

CVSS: 6.8EPSS: 2%CPEs: 13EXPL: 0

Integer signedness error in the window drawing implementation in Apple Java for Mac OS X 10.5 before Update 7 and Java for Mac OS X 10.6 before Update 2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted applet. Error de presencia de signo en entero en la implementación de la visualización de la ventana en Apple Java para Mac OS X 10.5 en versiones anteriores al Update 7 y Java para Mac OS X 10.6 en versiones anteriores al Update 2. Permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (caída de la aplicación) a través de un applet modificado. • http://lists.apple.com/archives/security-announce/2010//May/msg00001.html http://lists.apple.com/archives/security-announce/2010//May/msg00002.html http://secunia.com/advisories/39819 http://securitytracker.com/id?1024012 http://support.apple.com/kb/HT4170 http://support.apple.com/kb/HT4171 http://www.securityfocus.com/bid/40240 http://www.vupen.com/english/advisories/2010/1191 • CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 2%CPEs: 13EXPL: 0

Apple Java for Mac OS X 10.5 before Update 7 and Java for Mac OS X 10.6 before Update 2 do not properly handle mediaLibImage objects, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds memory access and application crash) via a crafted applet, related to the com.sun.medialib.mlib package. Apple Java para Mac OS X 10.5 en versiones anteriores al Update 7 y Java para Mac OS X 10.6 en versiones anteriores al Update 2 no utilizan apropiadamente los objetos mediaLibImage, lo que permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (acceso de memoria fuera de los límites y caída de la aplicación) a través de applet modificado. Relacionado con el paquete com.sun.medialib.mlib. • http://lists.apple.com/archives/security-announce/2010//May/msg00001.html http://lists.apple.com/archives/security-announce/2010//May/msg00002.html http://secunia.com/advisories/39819 http://securitytracker.com/id?1024011 http://support.apple.com/kb/HT4170 http://support.apple.com/kb/HT4171 http://www.securityfocus.com/bid/40238 http://www.vupen.com/english/advisories/2010/1191 • CWE-399: Resource Management Errors •

CVSS: 4.9EPSS: 0%CPEs: 6EXPL: 3

The hfs implementation in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 supports hard links to directories and does not prevent certain deeply nested directory structures, which allows local users to cause a denial of service (filesystem corruption) via a crafted application that calls the mkdir and link functions, related to the fsck_hfs program in the diskdev_cmds component. La implementación de hfs en Apple Mac OS X versión 10.5.8 y versión 10.6.x anterior a 10.6.5, admite enlaces físicos en directorios y no impide ciertas estructuras de directorios profundamente anidadas, lo que permite a los usuarios locales causar una denegación de servicio (corrupción del sistema de archivos) por medio de una aplicación creada que llama a las funciones mkdir y link, relacionadas con el programa fsck_hfs en el componente diskdev_cmds. Multiple vulnerabilities have been reported in HFS, including a hard linking issue that can be used to trigger a denial of service condition. • https://www.exploit-db.com/exploits/12375 http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://securityreason.com/achievement_securityalert/83 http://support.apple.com/kb/HT4435 http://www.securityfocus.com/bid/39658 http://www.securitytracker.com/id?1024723 •

CVSS: 4.3EPSS: 0%CPEs: 43EXPL: 0

Apple iTunes before 9.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted MP4 podcast file. Apple iTunes en versiones anteriores a la 9.1 permite a atacantes remotos provocar una denegación de servicio (bucle infinito) mediante un fichero de podcast MP4 manipulado. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00003.html http://secunia.com/advisories/39135 http://support.apple.com/kb/HT4105 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7427 • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

Heap-based buffer overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with RLE encoding, which triggers memory corruption when the length of decompressed data exceeds that of the allocated heap chunk. Desbordamiento de búfer basado en pila en QuickTime en Apple Mac OS X anteriores a v10.6.3 permite a atacantes remotos ejecutar código arbitrario o una denegación de servicio (caída de aplicación) a través de un fichero manipulado de película con codificación RLE. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists during the parsing of samples from a malformed .mov file utilizing the RLE codec. While decoding RLE data, the application will fail to validate the size when decompressing the data into a heap chunk. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html http://support.apple.com/kb/HT4077 http://www.securityfocus.com/archive/1/510513/100/0/threaded http://www.zerodayinitiative.com/advisories/ZDI-10-040 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7062 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •