Page 126 of 813 results (0.010 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Multiple unspecified vulnerabilities in BOMArchiveHelper in Mac OS X allow user-assisted remote attackers to cause a denial of service (application crash) via unspecified vectors related to (1) certain KERN_PROTECTION_FAILURE thread crashes and (2) certain KERN_INVALID_ADDRESS thread crashes, as discovered with the "iSec Partners FileP fuzzer". Múltiples vulnerabilidades no especificadas en BOMArchiveHelper de Mac OS X permiten a atacantes remotos con la intervención del usuario provocar una denegación de servicio (caída de la aplicación) mediante vectores relacionados con ciertas caídas de hilos (1) KERN_PROTECTION_FAILURE y (2) KERN_INVALID_ADDRESS, como ha sido descubierto con el "iSec Partners FileP fuzzer". • http://security-protocols.com/2006/12/04/bomarchivehelper-needs-some-lovin http://www.securityfocus.com/bid/21446 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

Integer overflow in the fatfile_getarch2 in Apple Mac OS X allows local users to cause a denial of service and possibly execute arbitrary code via a crafted Mach-O Universal program that triggers memory corruption. Desbordamiento de enteros en fatfile_getarch2 en Apple Mac OS X permite a un usuario local provocar denegación de servicio y posiblemente ejecutar código de su elección a través del programa Mach-O Universal manipulado que dispara una corrupción de memoria. • https://www.exploit-db.com/exploits/29190 http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-26-11-2006.html http://secunia.com/advisories/23088 http://secunia.com/advisories/24479 http://www.osvdb.org/30706 http://www.securityfocus.com/bid/21291 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http:// •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 2

Apple Mac OS X kernel allows local users to cause a denial of service via a process that uses kevent to register a queue and an event, then fork a child process that uses kevent to register an event for the same queue as the parent. Núcleo Apple Mac OS X permite a un usuario local provocar denegación de servicio a través de un proceso que usa kevent para registrar una cola o un evento, entonces se bifurca en un proceso hijo que usa kevent para registrar un evento para la misma cola que la del padre. • http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://projects.info-pull.com/mokb/MOKB-24-11-2006.html http://secunia.com/advisories/23114 http://secunia.com/advisories/27643 http://www.osvdb.org/30695 http://www.securityfocus.com/bid/21285 http://www.securityfocus.com/bid/26444 http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2006/4715 http: •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 1

Apple Mac OS X allows local users to cause a denial of service (memory corruption) via a crafted Mach-O binary with a malformed load_command data structure. Apple Mac OS X permite a un usuario local provocar denegación de servicio (memoria corrupta) a través del binario manipulado Mach-O con una estructura de datos mal formada load_command. • http://projects.info-pull.com/mokb/MOKB-23-11-2006.html http://www.osvdb.org/30740 http://www.securityfocus.com/bid/21272 http://www.vupen.com/english/advisories/2006/4714 https://exchange.xforce.ibmcloud.com/vulnerabilities/30549 •

CVSS: 5.1EPSS: 27%CPEs: 2EXPL: 4

Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a malformed UDTO HFS+ disk image, such as with "bad sectors," which triggers memory corruption. Vulnerabilidad no especificada en Apple Mac OSX 10.4.8, y posiblemente otras versiones, permite a atacantes remotos provocar una denegación de servicio (caída) mediante una imagen de disco UDTO HFS+ mal formada, como por ejemplo con "sectores dañados", lo cual provoca una corrupción de memoria. • https://www.exploit-db.com/exploits/29144 https://www.exploit-db.com/exploits/29161 http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-21-11-2006.html http://secunia.com/advisories/23012 http://secunia.com/advisories/23062 http://secunia.com/advisories/24479 http://securitytracker.com/id?1017260 http://www.osvdb.org/30510 http://www.securityfocus.com/bid& •