Page 104 of 606 results (0.005 seconds)

CVSS: 3.7EPSS: 0%CPEs: 2EXPL: 0

Apple Mac OS X 10.4.x up to 10.4.1 sets insecure world- and group-writable permissions for the (1) system cache folder and (2) Dashboard system widgets, which allows local users to conduct unauthorized file operations via "file race conditions." • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

LaunchServices in Apple Mac OS X 10.4.x up to 10.4.1 does not properly mark file extensions and MIME types as unsafe if an Apple Uniform Type Identifier (UTI) is not created when the type is added to the database of unsafe types, which could allow attackers to bypass intended restrictions. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://securitytracker.com/id?1014141 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 1

launchd 106 in Apple Mac OS X 10.4.x up to 10.4.1 allows local users to overwrite arbitrary files via a symlink attack on the socket file in an insecure temporary directory. • https://www.exploit-db.com/exploits/1043 http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://marc.info/?l=bugtraq&m=111833509424379&w=2 http://www.suresec.org/advisories/adv3.pdf •

CVSS: 7.2EPSS: 0%CPEs: 54EXPL: 0

Integer overflow in the searchfs system call in Mac OS X 10.3.9 and earlier allows local users to execute arbitrary code via crafted parameters. • http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html http://www.kb.cert.org/vuls/id/185702 •

CVSS: 5.1EPSS: 1%CPEs: 21EXPL: 1

The AppleScript Editor in Mac OS X 10.3.9 does not properly display script code for an applescript: URI, which can result in code that is different than the actual code that would be run, which could allow remote attackers to trick users into executing malicious code via certain URI characters such as NULL, control characters, and homographs. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://remahl.se/david/vuln/010 http://secunia.com/advisories/15227 http://www.securityfocus.com/bid/13480 http://www.vupen.com/english/advisories/2005/0455 •