Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2013-09-19 CVE-2013-1035 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Itunes
The iTunes ActiveX control in Apple iTunes before 11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
network
apple CWE-119
critical
9.3
2013-09-19 CVE-2013-1034 Cross-Site Scripting vulnerability in Apple OS X Server
Multiple cross-site scripting (XSS) vulnerabilities in Wiki Server in Apple Mac OS X Server before 2.2.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
network
apple CWE-79
4.3
2013-09-19 CVE-2013-0957 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
Data Protection in Apple iOS before 7 allows attackers to bypass intended limits on incorrect passcode entry, and consequently avoid a configured Erase Data setting, by leveraging the presence of an app in the third-party sandbox.
network
apple CWE-264
5.8
2013-09-19 CVE-2011-2391 Improper Input Validation vulnerability in Apple Iphone OS, Itunes and mac OS X
The IPv6 implementation in the kernel in Apple iOS before 7 allows remote attackers to cause a denial of service (CPU consumption) via crafted ICMPv6 packets.
low complexity
apple CWE-20
6.1
2013-09-18 CVE-2013-3893 Resource Management Errors vulnerability in Microsoft Internet Explorer
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
network
microsoft CWE-399
critical
9.3
2013-09-18 CVE-2013-1738 Resource Management Errors vulnerability in Mozilla Firefox, Seamonkey and Thunderbird
Use-after-free vulnerability in the JS_GetGlobalForScopeChain function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain restoration.
network
mozilla CWE-399
critical
9.3
2013-09-18 CVE-2013-1737 Permissions, Privileges, and Access Controls vulnerability in Mozilla products
Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
network
low complexity
mozilla CWE-264
5.0
2013-09-18 CVE-2013-1736 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mozilla products
The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
network
low complexity
mozilla CWE-119
critical
10.0
2013-09-18 CVE-2013-1735 Improper Input Validation vulnerability in Mozilla products
Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
network
mozilla CWE-20
critical
9.3
2013-09-18 CVE-2013-1732 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mozilla products
Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
network
mozilla CWE-119
critical
9.3