Filtered by vendor Apple Subscriptions
Filtered by product Darwin Streaming Server Subscriptions
Total 27 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2003-0421 1 Apple 1 Darwin Streaming Server 2025-04-03 N/A
Apple QuickTime / Darwin Streaming Server before 4.1.3f allows remote attackers to cause a denial of service (crash) via an MS-DOS device name (e.g. AUX) in a request to HTTP port 1220, a different vulnerability than CVE-2003-0502.
CVE-2003-0424 1 Apple 1 Darwin Streaming Server 2025-04-03 N/A
Apple QuickTime / Darwin Streaming Server before 4.1.3f allows remote attackers to obtain the source code for scripts by appending encoded space (%20) or . (%2e) characters to an HTTP request for the script, e.g. view_broadcast.cgi.
CVE-2003-0425 1 Apple 1 Darwin Streaming Server 2025-04-03 N/A
Directory traversal vulnerability in Apple QuickTime / Darwin Streaming Server before 4.1.3f allows remote attackers to read arbitrary files via a ... (triple dot) in an HTTP request.
CVE-2003-0502 1 Apple 1 Darwin Streaming Server 2025-04-03 N/A
Apple QuickTime / Darwin Streaming Server before 4.1.3g allows remote attackers to cause a denial of service (crash) via a .. (dot dot) sequence followed by an MS-DOS device name (e.g. AUX) in a request to HTTP port 1220, a different vulnerability than CVE-2003-0421.
CVE-2004-0169 1 Apple 1 Darwin Streaming Server 2025-04-03 N/A
QuickTime Streaming Server in MacOS X 10.2.8 and 10.3.2 allows remote attackers to cause a denial of service (crash) via DESCRIBE requests with long User-Agent fields, which causes an Assert error to be triggered in the BufferIsFull function.
CVE-2003-0423 1 Apple 1 Darwin Streaming Server 2025-04-03 N/A
parse_xml.cgi in Apple QuickTime / Darwin Streaming Server before 4.1.3g allows remote attackers to obtain the source code for parseable files via the filename parameter.
CVE-2003-1413 1 Apple 2 Darwin Streaming Server, Quicktime Streaming Server 2025-04-03 N/A
parse_xml.cgi in Apple Darwin Streaming Server 4.1.1 allows remote attackers to determine the existence of arbitrary files by using ".." sequences in the filename parameter and comparing the resulting error messages.