Vulnerabilities > Apple > Medium

DATE CVE VULNERABILITY TITLE RISK
2008-07-14 CVE-2008-1589 Improper Input Validation vulnerability in Apple Safari
Safari on Apple iPhone before 2.0 and iPod touch before 2.0 misinterprets a menu button press as user confirmation for visiting a web site with a (1) self-signed or (2) invalid certificate, which makes it easier for remote attackers to spoof web sites.
network
apple CWE-20
4.3
2008-07-14 CVE-2008-1588 Improper Input Validation vulnerability in Apple Safari
Safari on Apple iPhone before 2.0 and iPod touch before 2.0 allows remote attackers to spoof the address bar via Unicode ideographic spaces in the URL.
network
apple CWE-20
4.3
2008-07-01 CVE-2008-2314 Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X and mac OS X Server
Dock in Apple Mac OS X 10.5 before 10.5.4, when Exposé hot corners is enabled, allows physically proximate attackers to gain access to a locked session in (1) sleep mode or (2) screen saver mode via unspecified vectors.
local
apple CWE-264
4.4
2008-07-01 CVE-2008-2313 Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X and mac OS X Server
Apple Mac OS X before 10.5 uses weak permissions for the User Template directory, which allows local users to gain privileges by inserting a Trojan horse file into this directory.
local
low complexity
apple CWE-264
4.6
2008-07-01 CVE-2008-2310 USE of Externally-Controlled Format String vulnerability in Apple mac OS X and mac OS X Server
Format string vulnerability in c++filt in Apple Mac OS X 10.5 before 10.5.4 allows user-assisted attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string in (1) C++ or (2) Java source code.
network
apple CWE-134
6.8
2008-07-01 CVE-2008-2309 Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X and mac OS X Server
Incomplete blacklist vulnerability in CoreTypes in Apple Mac OS X before 10.5.4 allows user-assisted remote attackers to execute arbitrary code via a (1) .xht or (2) .xhtm file, which does not trigger a "potentially unsafe" warning message in (a) the Download Validation feature in Mac OS X 10.4 or (b) the Quarantine feature in Mac OS X 10.5.
network
apple CWE-264
6.8
2008-07-01 CVE-2008-2308 Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X and mac OS X Server
Unspecified vulnerability in Alias Manager in Apple Mac OS X 10.5.1 and earlier on Intel platforms allows local users to gain privileges or cause a denial of service (memory corruption and application crash) by resolving an alias that contains crafted AFP volume mount information.
local
low complexity
apple CWE-264
4.6
2008-06-10 CVE-2008-1585 Improper Input Validation vulnerability in Apple Quicktime
Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.
network
apple CWE-20
6.8
2008-06-10 CVE-2008-1584 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Quicktime
Stack-based buffer overflow in Indeo.qtx in Apple QuickTime before 7.5 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via crafted Indeo video codec content in a movie file.
network
apple CWE-119
6.8
2008-06-10 CVE-2008-1583 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Quicktime
Heap-based buffer overflow in Apple QuickTime before 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PICT image, a different vulnerability than CVE-2008-1581.
network
apple CWE-119
6.8