Page 112 of 603 results (0.009 seconds)

CVSS: 2.1EPSS: 0%CPEs: 51EXPL: 0

CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local users to obtain user names and passwords. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.ciac.org/ciac/bulletins/p-002.shtml http://www.debian.org/security/2004/dsa-566 http://www.kb.cert.org/vuls/id/557062 http://www.mandriva.com/security/advisories?name=MDKSA-2004:116 http://www.redhat.com/support/errata/RHSA-2004-543.html http://www.securityfocus.com/bid/11324 https://exchange.xforce.ibmcloud.com/vulnerabilities/17593 https://oval.cisecurity.org/repository/search/definition/ov •

CVSS: 7.5EPSS: 3%CPEs: 86EXPL: 0

Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. • http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.linuxcompatible.org/print42495.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html http://www.securityfocus.com/bid/11347 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

The CFPlugIn in Core Foundation framework in Mac OS X allows user supplied libraries to be loaded, which could allow local users to gain privileges. • http://secunia.com/advisories/12491 http://www.auscert.org.au/render.html?it=4363 http://www.ciac.org/ciac/bulletins/o-212.shtml http://www.kb.cert.org/vuls/id/704110 http://www.securityfocus.com/bid/11135 https://exchange.xforce.ibmcloud.com/vulnerabilities/17291 •

CVSS: 5.0EPSS: 4%CPEs: 3EXPL: 0

QuickTime Streaming Server in Mac OS X Server 10.2.8, 10.3.4, and 10.3.5 allows remote attackers to cause a denial of service (application deadlock) via a certain sequence of operations. • http://marc.info/?l=bugtraq&m=109467471617466&w=2 http://secunia.com/advisories/12491 http://securitytracker.com/id?1011176 http://www.ciac.org/ciac/bulletins/o-212.shtml http://www.kb.cert.org/vuls/id/914870 http://www.securityfocus.com/advisories/7148 http://www.securityfocus.com/bid/11138 https://exchange.xforce.ibmcloud.com/vulnerabilities/17294 •

CVSS: 7.5EPSS: 1%CPEs: 70EXPL: 0

OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. • http://secunia.com/advisories/12491 http://secunia.com/advisories/17233 http://secunia.com/advisories/21520 http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm http://www.auscert.org.au/render.html?it=4363 http://www.redhat.com/support/errata/RHSA-2005-751.html http://www.securityfocus.com/advisories/7148 http://www.securityfocus.com/bid/11137 https://exchange.xforce.ibmcloud.com/vulnerabilities/17300 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre&# •