Vulnerabilities > Apple
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-04-15 | CVE-2011-0195 | Information Exposure vulnerability in Apple Iphone OS 4.3.0/4.3.1 The generate-id XPath function in libxslt in Apple iOS 4.3.x before 4.3.2 allows remote attackers to obtain potentially sensitive information about heap memory addresses via a crafted web site. | 4.3 |
2011-04-15 | CVE-2011-1691 | Null Pointer Dereference vulnerability in Google Chrome The counterToCSSValue function in CSSComputedStyleDeclaration.cpp in the Cascading Style Sheets (CSS) implementation in WebCore in WebKit before r82222, as used in Google Chrome before 11.0.696.43 and other products, does not properly handle access to the (1) counterIncrement and (2) counterReset attributes of CSSStyleDeclaration data provided by a getComputedStyle method call, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted JavaScript code. | 5.0 |
2011-04-04 | CVE-2011-1425 | Permissions, Privileges, and Access Controls vulnerability in multiple products xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification. | 5.1 |
2011-03-25 | CVE-2011-1296 | Improper Input Validation vulnerability in Google Chrome Google Chrome before 10.0.648.204 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | 7.5 |
2011-03-25 | CVE-2011-1295 | Improper Input Validation vulnerability in Google Chrome WebKit, as used in Google Chrome before 10.0.648.204 and Apple Safari before 5.0.6, does not properly handle node parentage, which allows remote attackers to cause a denial of service (DOM tree corruption), conduct cross-site scripting (XSS) attacks, or possibly have unspecified other impact via unknown vectors. | 7.5 |
2011-03-25 | CVE-2011-1293 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in the HTMLCollection implementation in Google Chrome before 10.0.648.204 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | 7.5 |
2011-03-23 | CVE-2011-0194 | Numeric Errors vulnerability in Apple Imageio, mac OS X and mac OS X Server Integer overflow in ImageIO in Apple Mac OS X 10.6 before 10.6.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding. | 6.8 |
2011-03-23 | CVE-2011-0193 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple mac OS X and mac OS X Server Multiple buffer overflows in Image RAW in Apple Mac OS X before 10.6.7 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Canon RAW image. | 6.8 |
2011-03-23 | CVE-2011-0190 | Improper Input Validation vulnerability in Apple Installer, mac OS X and mac OS X Server Install Helper in Installer in Apple Mac OS X before 10.6.7 does not properly process an unspecified URL, which might allow remote attackers to track user logins by logging network traffic from an agent that was intended to send network traffic to an Apple server. | 4.3 |
2011-03-23 | CVE-2011-0189 | Configuration vulnerability in Apple mac OS X, mac OS X Server and Terminal The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities. | 5.0 |