Page 461 of 2946 results (0.011 seconds)

CVSS: 6.8EPSS: 10%CPEs: 44EXPL: 0

Stack-based buffer overflow in Image RAW in Apple Mac OS X 10.5 before 10.5.8, and 10.4 before Digital Camera RAW Compatibility Update 2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Canon RAW image. Desbordamiento de Pila basado en búfer en Image RAW en Apple Mac OS X v10.5 anterior a v10.5.8, y v10.4 anterior a Digital Camera RAW Compatibility Update v2.6(actualización de compatibilidad con cámara digital RAW v2.6), permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (cuelgue de aplicación) a través de una imagen Canon RAW manipulada. • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://osvdb.org/56843 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://www.securityfocus.com/bid/35954 http://www.securitytracker.com/id?1022674 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52423 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

MobileMe in Apple Mac OS X 10.5 before 10.5.8 does not properly delete credentials upon signout from the preference pane, which makes it easier for attackers to hijack a MobileMe session via unspecified vectors, related to a "logic issue." MobileMe en Apple Mac OS X 10.5 anterior a v10.5.8 no elimina adecuadamente las credenciales al salir del panel de preferencias, lo cual hace más fácil para los atacantes secuestrar una sesión MobileMe a través de vectores no especificados, relacionado con una "cuestión lógica". • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://osvdb.org/56839 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://www.securityfocus.com/bid/35954 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52432 • CWE-255: Credentials Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 20EXPL: 0

CFNetwork in Apple Mac OS X 10.5 before 10.5.8 places an incorrect URL in a certificate warning in certain 302 redirection scenarios, which makes it easier for remote attackers to trick a user into visiting an arbitrary https web site by leveraging an open redirect vulnerability, a different issue than CVE-2009-2062. CFNetwork en Apple Mac OS X v10.5 anterior a v10.5.8 coloca una URL incorrecta en una advertencia de certificado en algunos escenarios de redirección 302, lo cual hace más fácil para los atacantes remotos engañar a un usuario para que visite un sitio web https arbitrario aprovechando una vulnerabilidad de redireccionamiento abierto, una cuestión diferente que CVE-2009-2062. • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html http://osvdb.org/56846 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://support.apple.com/kb/HT4225 http://www.securityfocus.com/bid/35954 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52418 •

CVSS: 7.2EPSS: 0%CPEs: 20EXPL: 0

The screen saver in Dock in Apple Mac OS X 10.5 before 10.5.8 does not prevent four-finger Multi-Touch gestures, which allows physically proximate attackers to bypass locking and "manage applications or use Expose" via unspecified vectors. El protector de pantalla en el Dock en Apple Mac OS X v10.5 anterior a v10.5.8 no previene gestos multi-tactiles cuatro-dedos (four-finger Multi-Touch), lo cual permite a atacantes próximos físicamente eludir el bloqueo y "gestionar aplicaciones o exposición al uso" a través de vectores no especificados. • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://osvdb.org/56847 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://www.securityfocus.com/bid/35954 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52421 •

CVSS: 6.8EPSS: 0%CPEs: 13EXPL: 0

The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer. La implementación de la descompresión en la función Imf::hufUncompress en OpenEXR v1.2.2 y v1.6.1 permite a los atacantes dependientes del contexto provocar una denegación de servicio (finalización de la aplicación) o posiblemente ejecutar código de su elección mediante vectores que provocan una estructura de punteros no inicializados. • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html http://release.debian.org/proposed-updates/stable_diffs/openexr_1.6.1-3%2Blenny3.debdiff http://secunia.com/advisories/36030 http://secunia.com/advisories/36032 http://secunia.com/advisories/36096 http://secunia.com/advisories/36123 http://secunia.com/advisories/36753 http://security.debian.org/pool/updates/main/o/openexr/openexr_1.2.2&# • CWE-824: Access of Uninitialized Pointer •