Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-4381

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-12 Sep, 2006 | 23:00
Updated At-07 Aug, 2024 | 19:06
Rejected At-
Credits

Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:12 Sep, 2006 | 23:00
Updated At:07 Aug, 2024 | 19:06
Rejected At:
▼CVE Numbering Authority (CNA)

Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://securitytracker.com/id?1016830
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/21893
third-party-advisory
x_refsource_SECUNIA
http://secway.org/advisory/AD20060912.txt
x_refsource_MISC
http://www.securityfocus.com/bid/19976
vdb-entry
x_refsource_BID
http://securityreason.com/securityalert/1551
third-party-advisory
x_refsource_SREASON
http://www.osvdb.org/28774
vdb-entry
x_refsource_OSVDB
http://docs.info.apple.com/article.html?artnum=304357
x_refsource_CONFIRM
http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html
vendor-advisory
x_refsource_APPLE
http://www.vupen.com/english/advisories/2006/3577
vdb-entry
x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/28928
vdb-entry
x_refsource_XF
http://www.securityfocus.com/archive/1/445830/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://securitytracker.com/id?1016830
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/21893
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secway.org/advisory/AD20060912.txt
Resource:
x_refsource_MISC
Hyperlink: http://www.securityfocus.com/bid/19976
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://securityreason.com/securityalert/1551
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://www.osvdb.org/28774
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://docs.info.apple.com/article.html?artnum=304357
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.vupen.com/english/advisories/2006/3577
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/28928
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.securityfocus.com/archive/1/445830/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://securitytracker.com/id?1016830
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/21893
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secway.org/advisory/AD20060912.txt
x_refsource_MISC
x_transferred
http://www.securityfocus.com/bid/19976
vdb-entry
x_refsource_BID
x_transferred
http://securityreason.com/securityalert/1551
third-party-advisory
x_refsource_SREASON
x_transferred
http://www.osvdb.org/28774
vdb-entry
x_refsource_OSVDB
x_transferred
http://docs.info.apple.com/article.html?artnum=304357
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.vupen.com/english/advisories/2006/3577
vdb-entry
x_refsource_VUPEN
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/28928
vdb-entry
x_refsource_XF
x_transferred
http://www.securityfocus.com/archive/1/445830/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://securitytracker.com/id?1016830
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/21893
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secway.org/advisory/AD20060912.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securityfocus.com/bid/19976
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://securityreason.com/securityalert/1551
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://www.osvdb.org/28774
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=304357
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3577
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/28928
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/445830/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:12 Sep, 2006 | 23:07
Updated At:03 Apr, 2025 | 01:03

Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.1MEDIUM
AV:N/AC:H/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 5.1
Base severity: MEDIUM
Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P
CPE Matches

Apple Inc.
apple
>>quicktime>>Versions up to 7.1.2(inclusive)
cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>5.0
cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>5.0.1
cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>5.0.2
cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>6.0
cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>6.1
cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>6.5
cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>6.5.1
cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>6.5.2
cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>6.5.2
cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.2:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>6.5.2
cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.3:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0
cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0
cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0.1
cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0.1
cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.3:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0.1
cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.4:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0.1
cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0.2
cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0.2
cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0.3
cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.0.4
cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
Apple Inc.
apple
>>quicktime>>7.1.1
cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

This vulnerability is addressed in the following product release: Apple, QuickTime Player, 7.1.3

Vendor Statements

References
HyperlinkSourceResource
http://docs.info.apple.com/article.html?artnum=304357cve@mitre.org
N/A
http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.htmlcve@mitre.org
Patch
http://secunia.com/advisories/21893cve@mitre.org
N/A
http://securityreason.com/securityalert/1551cve@mitre.org
N/A
http://securitytracker.com/id?1016830cve@mitre.org
N/A
http://secway.org/advisory/AD20060912.txtcve@mitre.org
Exploit
Patch
Vendor Advisory
http://www.osvdb.org/28774cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/445830/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/19976cve@mitre.org
Exploit
Patch
http://www.vupen.com/english/advisories/2006/3577cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/28928cve@mitre.org
N/A
http://docs.info.apple.com/article.html?artnum=304357af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
http://secunia.com/advisories/21893af854a3a-2127-422b-91ae-364da2661108
N/A
http://securityreason.com/securityalert/1551af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1016830af854a3a-2127-422b-91ae-364da2661108
N/A
http://secway.org/advisory/AD20060912.txtaf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Vendor Advisory
http://www.osvdb.org/28774af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/445830/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/19976af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://www.vupen.com/english/advisories/2006/3577af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/28928af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=304357
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://secunia.com/advisories/21893
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/1551
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1016830
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secway.org/advisory/AD20060912.txt
Source: cve@mitre.org
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://www.osvdb.org/28774
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/445830/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/19976
Source: cve@mitre.org
Resource:
Exploit
Patch
Hyperlink: http://www.vupen.com/english/advisories/2006/3577
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/28928
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=304357
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://secunia.com/advisories/21893
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/1551
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1016830
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secway.org/advisory/AD20060912.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://www.osvdb.org/28774
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/445830/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/19976
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://www.vupen.com/english/advisories/2006/3577
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/28928
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

66Records found

CVE-2004-0431
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-0.95% / 75.49%
||
7 Day CHG~0.00%
Published-06 May, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to execute arbitrary code via a large "number of entries" field in the sample-to-chunk table data for a .mov movie file, which leads to a heap-based buffer overflow.

Action-Not Available
Vendor-n/aApple Inc.
Product-quicktimen/a
CVE-2006-1454
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-24.61% / 95.92%
||
7 Day CHG~0.00%
Published-12 May, 2006 | 20:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted QuickDraw PICT image format file with malformed image data.

Action-Not Available
Vendor-n/aApple Inc.
Product-quicktimen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2006-1459
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-9.75% / 92.64%
||
7 Day CHG~0.00%
Published-12 May, 2006 | 20:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in Apple QuickTime before 7.1 allow remote attackers to cause a denial of service or execute arbitrary code via a crafted QuickTime movie (.MOV).

Action-Not Available
Vendor-n/aApple Inc.
Product-quicktimen/a
CVE-2006-0396
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-23.31% / 95.74%
||
7 Day CHG~0.00%
Published-14 Mar, 2006 | 11:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CVE-2005-2754
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-1.44% / 79.94%
||
7 Day CHG~0.00%
Published-05 Nov, 2005 | 11:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in Apple QuickTime before 7.0.3 allows user-assisted attackers to execute arbitrary code via a crafted MOV file with "Improper movie attributes."

Action-Not Available
Vendor-n/aApple Inc.
Product-quicktimen/a
CVE-2005-2756
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-2.31% / 84.14%
||
7 Day CHG~0.00%
Published-05 Nov, 2005 | 11:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apple QuickTime before 7.0.3 allows user-assisted attackers to overwrite memory and execute arbitrary code via a crafted PICT file that triggers an overflow during expansion.

Action-Not Available
Vendor-n/aApple Inc.
Product-quicktimen/a
CVE-2011-2896
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.1||MEDIUM
EPSS-5.27% / 89.62%
||
7 Day CHG~0.00%
Published-19 Aug, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.

Action-Not Available
Vendor-swi-prologn/aApple Inc.GIMP
Product-gimpswi-prologcupsn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30984
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-0.81% / 73.27%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 18:51
Updated-03 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.

Action-Not Available
Vendor-Debian GNU/LinuxFedora ProjectApple Inc.
Product-iphone_osdebian_linuxipadostvoswatchossafarifedoramacoswatchOSmacOSiOS and iPadOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-30786
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-7||HIGH
EPSS-0.21% / 43.32%
||
7 Day CHG-0.04%
Published-08 Sep, 2021 | 13:48
Updated-03 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with improved state handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osmacosmacOSiOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-30995
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-7||HIGH
EPSS-0.18% / 39.77%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 18:51
Updated-03 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to elevate privileges.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_oswatchosipadostvosmac_os_xmacoswatchOSmacOSiOS and iPadOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-31004
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-7||HIGH
EPSS-0.21% / 43.71%
||
7 Day CHG+0.06%
Published-24 Aug, 2021 | 18:51
Updated-03 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with improved locking. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.5. An application may be able to gain elevated privileges.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2011-0154
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.75% / 72.23%
||
7 Day CHG~0.00%
Published-03 Mar, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebKit, as used in Apple iTunes before 10.2 on Windows and Apple iOS, does not properly implement the .sort function for JavaScript arrays, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

Action-Not Available
Vendor-n/aMicrosoft CorporationApple Inc.
Product-iphone_oswindowsitunesn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2010-2520
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.1||MEDIUM
EPSS-3.15% / 86.40%
||
7 Day CHG~0.00%
Published-19 Aug, 2010 | 17:43
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.

Action-Not Available
Vendor-freetypen/aCanonical Ltd.Apple Inc.Debian GNU/Linux
Product-ubuntu_linuxdebian_linuxmac_os_xfreetypen/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-4192
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-60.87% / 98.23%
||
7 Day CHG~0.00%
Published-08 Jun, 2018 | 18:00
Updated-05 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a race condition.

Action-Not Available
Vendor-n/aApple Inc.Microsoft Corporation
Product-itunesiphone_oswatchostvossafariwindowsicloudn/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-9615
Matching Score-8
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-8
Assigner-Adobe Systems Incorporated
CVSS Score-7||HIGH
EPSS-0.36% / 57.46%
||
7 Day CHG~0.00%
Published-25 Jun, 2020 | 21:21
Updated-04 Aug, 2024 | 10:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a race condition vulnerability. Successful exploitation could lead to security feature bypass.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-acrobat_dcwindowsmacosacrobat_reader_dcAdobe Acrobat and Reader
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-9839
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-7||HIGH
EPSS-42.29% / 97.35%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 16:16
Updated-04 Aug, 2024 | 10:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with improved state handling. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. An application may be able to gain elevated privileges.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_oswatchostvosipadosmac_os_xtvOSmacOSwatchOSiOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • Previous
  • 1
  • 2
  • Next
Details not found