Page 119 of 779 results (0.009 seconds)

CVSS: 2.6EPSS: 0%CPEs: 18EXPL: 0

QuickTime for Java on Mac OS X 10.4 through 10.4.8, when used with Quartz Composer, allows remote attackers to obtain sensitive information (screen images) via a Java applet that accesses images that are being rendered by other embedded QuickTime objects. QuickTime para Java en Mac OS X 10.4 hasta 10.4.8, cuando es usado con Quartz Composer, permite a atacantes remotos obtener información sensible (imágenes de la pantalla) mediante un applet de Java que accede a imágenes que han sido renderizadas por otros objetos QuickTime empotrados. • http://docs.info.apple.com/article.html?artnum=304916 http://lists.apple.com/archives/Security-announce/2006/Dec/msg00000.html http://secunia.com/advisories/23438 http://securitytracker.com/id?1017402 http://www.osvdb.org/32380 http://www.securityfocus.com/bid/21672 http://www.vupen.com/english/advisories/2006/5072 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Multiple unspecified vulnerabilities in BOMArchiveHelper in Mac OS X allow user-assisted remote attackers to cause a denial of service (application crash) via unspecified vectors related to (1) certain KERN_PROTECTION_FAILURE thread crashes and (2) certain KERN_INVALID_ADDRESS thread crashes, as discovered with the "iSec Partners FileP fuzzer". Múltiples vulnerabilidades no especificadas en BOMArchiveHelper de Mac OS X permiten a atacantes remotos con la intervención del usuario provocar una denegación de servicio (caída de la aplicación) mediante vectores relacionados con ciertas caídas de hilos (1) KERN_PROTECTION_FAILURE y (2) KERN_INVALID_ADDRESS, como ha sido descubierto con el "iSec Partners FileP fuzzer". • http://security-protocols.com/2006/12/04/bomarchivehelper-needs-some-lovin http://www.securityfocus.com/bid/21446 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

Integer overflow in the fatfile_getarch2 in Apple Mac OS X allows local users to cause a denial of service and possibly execute arbitrary code via a crafted Mach-O Universal program that triggers memory corruption. Desbordamiento de enteros en fatfile_getarch2 en Apple Mac OS X permite a un usuario local provocar denegación de servicio y posiblemente ejecutar código de su elección a través del programa Mach-O Universal manipulado que dispara una corrupción de memoria. • https://www.exploit-db.com/exploits/29190 http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-26-11-2006.html http://secunia.com/advisories/23088 http://secunia.com/advisories/24479 http://www.osvdb.org/30706 http://www.securityfocus.com/bid/21291 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http:// •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 2

Apple Mac OS X kernel allows local users to cause a denial of service via a process that uses kevent to register a queue and an event, then fork a child process that uses kevent to register an event for the same queue as the parent. Núcleo Apple Mac OS X permite a un usuario local provocar denegación de servicio a través de un proceso que usa kevent para registrar una cola o un evento, entonces se bifurca en un proceso hijo que usa kevent para registrar un evento para la misma cola que la del padre. • http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://projects.info-pull.com/mokb/MOKB-24-11-2006.html http://secunia.com/advisories/23114 http://secunia.com/advisories/27643 http://www.osvdb.org/30695 http://www.securityfocus.com/bid/21285 http://www.securityfocus.com/bid/26444 http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2006/4715 http: •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 1

Apple Mac OS X allows local users to cause a denial of service (memory corruption) via a crafted Mach-O binary with a malformed load_command data structure. Apple Mac OS X permite a un usuario local provocar denegación de servicio (memoria corrupta) a través del binario manipulado Mach-O con una estructura de datos mal formada load_command. • http://projects.info-pull.com/mokb/MOKB-23-11-2006.html http://www.osvdb.org/30740 http://www.securityfocus.com/bid/21272 http://www.vupen.com/english/advisories/2006/4714 https://exchange.xforce.ibmcloud.com/vulnerabilities/30549 •