Page 512 of 2946 results (0.032 seconds)

CVSS: 6.8EPSS: 3%CPEs: 3EXPL: 0

Integer underflow in Preview in PDFKit on Apple Mac OS X 10.4.10 allows remote attackers to execute arbitrary code via a crafted PDF file. Desbordamiento de entero en Preview de PDFKit en Apple Mac OS X 10.4.10 permite a atacantes remotos ejecutar código de su elección mediante un fichero PDF artesanal. • http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://secunia.com/advisories/26235 http://www.securityfocus.com/bid/25159 http://www.vupen.com/english/advisories/2007/2732 https://exchange.xforce.ibmcloud.com/vulnerabilities/35734 •

CVSS: 6.8EPSS: 4%CPEs: 3EXPL: 0

Quartz Composer on Apple Mac OS X 10.4.10 does not initialize a certain object pointer, which might allow user-assisted remote attackers to execute arbitrary code via a crafted Quartz Composer file. Quartz Composer en Apple Mac OS X 10.4.10 no inicializa cierto punto a objeto, lo cual podría permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante un fichero Quartz Composer manipulado artesanalmente. • http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://secunia.com/advisories/26235 http://www.securityfocus.com/bid/25159 http://www.vupen.com/english/advisories/2007/2732 https://exchange.xforce.ibmcloud.com/vulnerabilities/35737 •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

WebCore on Apple Mac OS X 10.3.9 and 10.4.10 retains properties of certain global objects when a new URL is visited in the same window, which allows remote attackers to conduct cross-site scripting (XSS) attacks. WebCore en Apple Mac OS X 10.3.9 y 10.4.10 retine propiedades de determinado objetos globales cuando se visita un nuevo URL en la misma ventana, lo cual permite a atacantes remotos conducir ataques de secuencias de comandos en sitios cruzados (XSS). • http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://secunia.com/advisories/26235 http://securitytracker.com/id?1018494 http://www.securityfocus.com/bid/25159 http://www.vupen.com/english/advisories/2007/2732 https://exchange.xforce.ibmcloud.com/vulnerabilities/35743 •

CVSS: 5.0EPSS: 0%CPEs: 42EXPL: 0

CRLF injection vulnerability in CFNetwork on Apple Mac OS X 10.3.9 and 10.4.10 before 20070731 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in an unspecified context. NOTE: this can be leveraged for cross-site scripting (XSS) attacks. Vulnerabilidad de inyección de retornos de carro y saltos de línea en CFNetwork en Apple Mac OS X 10.3.9 y 10.4.10 versiones anteriores a 20070731 permite a atacantes remotos inyectar cabeceras HTML de su elección y conducir ataques de partición de respuesta HTTP mediante secuencias CRLF (retornos de carro y saltos de línea) en un contexto no especificado. NOTA: esto puede ser utilizado para ataques de secuencias de comandos en sitios cruzados (XSS). • http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://secunia.com/advisories/26235 http://securitytracker.com/id?1018491 http://www.securityfocus.com/bid/25159 http://www.vupen.com/english/advisories/2007/2732 https://exchange.xforce.ibmcloud.com/vulnerabilities/35723 •

CVSS: 6.8EPSS: 3%CPEs: 42EXPL: 0

The Java interface to CoreAudio on Apple Mac OS X 10.3.9 and 10.4.10 does not restrict object instantiation and manipulation to valid heap addresses, which allows remote attackers to execute arbitrary code via a crafted applet. La interfaz Java de CoreAudio en Apple Mac OS X 10.3.9 y 10.4.10 no restringe la instanciación y manipulación de objetos en direcciones de montículo válidad, lo cual permite a atacantes remotos ejecutar código de su elección mediante un applet manipulado. • http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://secunia.com/advisories/26235 http://securitytracker.com/id?1018492 http://www.securityfocus.com/bid/25159 http://www.vupen.com/english/advisories/2007/2732 https://exchange.xforce.ibmcloud.com/vulnerabilities/35728 •