CVE-2005-1474
https://notcve.org/view.php?id=CVE-2005-1474
Dashboard in Apple Mac OS X 10.4.1 allows remote attackers to install widgets via Safari without prompting the user, a different vulnerability than CVE-2005-1933. • http://lists.apple.com/archives/security-announce/2005/May/msg00004.html http://www.securityfocus.com/bid/13694 •
CVE-2005-1724
https://notcve.org/view.php?id=CVE-2005-1724
NFS on Apple Mac OS X 10.4.x up to 10.4.1 does not properly obey the -network or -mask flags for a filesystem and exports it to everyone, which allows remote attackers to bypass intended access restrictions. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://securitytracker.com/id?1014142 •
CVE-2005-1727
https://notcve.org/view.php?id=CVE-2005-1727
Apple Mac OS X 10.4.x up to 10.4.1 sets insecure world- and group-writable permissions for the (1) system cache folder and (2) Dashboard system widgets, which allows local users to conduct unauthorized file operations via "file race conditions." • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html •
CVE-2005-1723
https://notcve.org/view.php?id=CVE-2005-1723
LaunchServices in Apple Mac OS X 10.4.x up to 10.4.1 does not properly mark file extensions and MIME types as unsafe if an Apple Uniform Type Identifier (UTI) is not created when the type is added to the database of unsafe types, which could allow attackers to bypass intended restrictions. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://securitytracker.com/id?1014141 •
CVE-2005-1725 – Apple Mac OSX 10.4 - launchd Race Condition
https://notcve.org/view.php?id=CVE-2005-1725
launchd 106 in Apple Mac OS X 10.4.x up to 10.4.1 allows local users to overwrite arbitrary files via a symlink attack on the socket file in an insecure temporary directory. • https://www.exploit-db.com/exploits/1043 http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://marc.info/?l=bugtraq&m=111833509424379&w=2 http://www.suresec.org/advisories/adv3.pdf •