Vulnerabilities > Apple > Medium

DATE CVE VULNERABILITY TITLE RISK
2010-10-08 CVE-2010-3887 Permissions, Privileges, and Access Controls vulnerability in Apple Mail
The Limit Mail feature in the Parental Controls functionality in Mail on Apple Mac OS X does not properly enforce the correspondence whitelist, which allows remote attackers to bypass intended access restrictions and conduct e-mail communication by leveraging knowledge of a child's e-mail address and a parent's e-mail address, related to parental notification of unapproved e-mail addresses.
network
apple CWE-264
4.3
2010-10-04 CVE-2010-1822 Incorrect Type Conversion OR Cast vulnerability in multiple products
WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3 and Google Chrome before 6.0.472.62, does not properly perform a cast of an unspecified variable, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an SVG element in a non-SVG document.
6.8
2010-09-29 CVE-2010-2530 Numeric Errors vulnerability in multiple products
Multiple integer signedness errors in smb_subr.c in the netsmb module in the kernel in NetBSD 5.0.2 and earlier, FreeBSD, and Apple Mac OS X allow local users to cause a denial of service (panic) via a negative size value in a /dev/nsmb ioctl operation, as demonstrated by a (1) SMBIOC_LOOKUP or (2) SMBIOC_OPENSESSION ioctl call.
local
low complexity
netbsd apple freebsd CWE-189
4.9
2010-09-21 CVE-2010-1820 Improper Authentication vulnerability in Apple mac OS X and mac OS X Server
Apple Filing Protocol (AFP) Server in Apple Mac OS X 10.6.x through 10.6.4 does not properly handle errors, which allows remote attackers to bypass the password requirement for shared-folder access by leveraging knowledge of a valid account name.
network
apple CWE-287
6.8
2010-09-10 CVE-2010-1805 Permissions, Privileges, and Access Controls vulnerability in Apple Safari
Untrusted search path vulnerability in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2 on Windows allows local users to gain privileges via a Trojan horse explorer.exe (aka Windows Explorer) program in a directory containing a file that had been downloaded by Safari.
6.9
2010-09-09 CVE-2010-1817 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS
Buffer overflow in ImageIO in Apple iOS before 4.1 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.
network
apple CWE-119
6.8
2010-09-09 CVE-2010-1815 Resource Management Errors vulnerability in multiple products
Use-after-free vulnerability in WebKit in Apple iOS before 4.1 on the iPhone and iPod touch, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving scrollbars.
6.8
2010-09-09 CVE-2010-1814 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
WebKit in Apple iOS before 4.1 on the iPhone and iPod touch, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors involving form menus.
6.8
2010-09-09 CVE-2010-1813 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS
WebKit in Apple iOS before 4.1 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors involving HTML object outlines.
network
apple CWE-119
6.8
2010-09-09 CVE-2010-1812 Resource Management Errors vulnerability in multiple products
Use-after-free vulnerability in WebKit in Apple iOS before 4.1 on the iPhone and iPod touch, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving selections.
6.8