Page 59 of 776 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

iChat Server in Apple Mac OS X Server before 10.6.3, when group chat is used, does not perform logging for all types of messages, which might allow remote attackers to avoid message auditing via an unspecified selection of message type. iChat Server en Apple Mac OS X Server anteriores a v10.6.3, cuando se utiliza el chat de grupo, no realiza el registro para todos los tipos de mensajes, lo cual podría permitir a atacantes remotos evitar la auditoría de mensajes a través de una selección no especificada de tipo de mensaje. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://support.apple.com/kb/HT4077 •

CVSS: 6.5EPSS: 0%CPEs: 13EXPL: 0

Use-after-free vulnerability in iChat Server in Apple Mac OS X Server 10.5.8 allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. Vulnerabilidad de uso después de la liberación en iChat Server de Apple Mac OS X Server v10.5.8 permite a usuarios autenticados en remoto ejecutar código de su elección o provocar una denegación de servicio (caída de la aplicación) a través de vectores no especificados • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://support.apple.com/kb/HT4077 • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

xar in Apple Mac OS X 10.5.8 does not properly validate package signatures, which allows attackers to have an unspecified impact via a modified package. xar en Apple Mac OS X v10.5.8 no valida apropiadamente la firma de los paquetes, lo que permite a atacantes remotos tener un impacto sin especificar a través de un paquete modificado. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://support.apple.com/kb/HT4077 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXQ3NRRTC4A3F3GW2RQNATJHYDIRSCBS •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

Heap-based buffer overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with M-JPEG encoding, which causes QuickTime to calculate a buffer size using height and width fields, but to use a different field to control the length of a copy operation. Desbordamiento de búfer basado en pila en QuickTime en Apple Mac OS X anterior v10.6.3 permite a atacantes remotos ejecutar código de su elección o causar una denegación de servicio (caída de programa) a través de un archivo de película manipualdo con codificación M-JPEG. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists during the parsing of compressed mjpeg data from a malformed .mov file. The application will utilize the width and height fields in the file for calculating the size of a heap buffer. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html http://support.apple.com/kb/HT4077 http://www.securityfocus.com/archive/1/510511/100/0/threaded http://www.zerodayinitiative.com/advisories/ZDI-10-037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6673 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 24EXPL: 0

Mail in Apple Mac OS X before 10.6.3 does not properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient, which might make it easier for remote attackers to obtain sensitive information via a brute-force attack on a weakly encrypted e-mail message. Mail en Apple Mac OS X anterior v10.6.3 no refuerza adecuadamente la clave de extensión usage durante el procesado de una cadena de claves que especifica múltiples certificados para un recipiente e-mail, lo que puede hacer que sea fácil para atacantes remotos obtener información sensible a través de ataques de fuerza bruta en un mensaje e-mail encriptado débilmente. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://support.apple.com/kb/HT4077 • CWE-310: Cryptographic Issues •