U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 71 matching records.
Displaying matches 61 through 71.
Vuln ID Summary CVSS Severity
CVE-2011-3221

QuickTime in Apple Mac OS X before 10.7.2 does not properly handle the atom hierarchy in movie files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted file.

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2011-3220

QuickTime in Apple Mac OS X before 10.7.2 does not properly process URL data handlers in movie files, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 4.3 MEDIUM
CVE-2011-3216

The kernel in Apple Mac OS X before 10.7.2 does not properly implement the sticky bit for directories, which might allow local users to bypass intended permissions and delete files via an unlink system call.

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2011-3215

The kernel in Apple Mac OS X before 10.7.2 does not properly prevent FireWire DMA in the absence of a login, which allows physically proximate attackers to bypass intended access restrictions and discover a password by making a DMA request in the (1) loginwindow, (2) boot, or (3) shutdown state.

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2011-3213

The File Systems component in Apple Mac OS X before 10.7.2 does not properly track the specific X.509 certificate that a user manually accepted for an initial https WebDAV connection, which allows man-in-the-middle attackers to hijack WebDAV communication by presenting an arbitrary certificate for a subsequent connection.

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 7.6 HIGH
CVE-2011-3212

CoreStorage in Apple Mac OS X 10.7 before 10.7.2 does not ensure that all disk data is encrypted during the enabling of FileVault, which makes it easier for physically proximate attackers to obtain sensitive information by reading directly from the disk device.

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2011-0260

The CoreProcesses component in Apple Mac OS X 10.7 before 10.7.2 does not prevent a system window from receiving keystrokes in the locked-screen state, which might allow physically proximate attackers to bypass intended access restrictions by typing into this window.

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 4.6 MEDIUM
CVE-2011-0231

CFNetwork in Apple Mac OS X before 10.7.2 does not properly follow an intended cookie-storage policy, which makes it easier for remote web servers to track users via a cookie, related to a "synchronization issue."

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-2011-0230

Buffer overflow in the ATSFontDeactivate API in Apple Type Services (ATS) in Apple Mac OS X before 10.7.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.

Published: October 14, 2011; 6:55:08 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2011-0185

Format string vulnerability in the debug-logging feature in Application Firewall in Apple Mac OS X before 10.7.2 allows local users to gain privileges via a crafted name of an executable file.

Published: October 14, 2011; 6:55:07 AM -0400
V3.x:(not available)
V2.0: 4.4 MEDIUM
CVE-2011-1755

jabberd2 before 2.2.14 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.

Published: June 20, 2011; 10:52:43 PM -0400
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM