Page 135 of 776 results (0.008 seconds)

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

The malloc function in the libSystem library in Apple Mac OS X 10.3.9 and 10.4.2 allows local users to overwrite arbitrary files by setting the MallocLogFile environment variable to the target file before running a setuid application. • http://lists.apple.com/archives/security-announce/2005/Sep/msg00002.html http://secunia.com/advisories/16920 http://www.auscert.org.au/5509 http://www.ciac.org/ciac/bulletins/p-312.shtml http://www.suresec.org/advisories/adv7.pdf •

CVSS: 2.1EPSS: 0%CPEs: 61EXPL: 0

Unknown vulnerability in loginwindow in Mac OS X 10.4.2 and earlier, when Fast User Switching is enabled, allows attackers to log into other accounts if they know the passwords to at least two accounts. • http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://securitytracker.com/id?1014704 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 1

dsidentity in Directory Services in Mac OS X 10.4.2 allows local users to add or remove user accounts. • https://www.exploit-db.com/exploits/26185 http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Buffer overflow in Directory Services in Mac OS X 10.3.9 and 10.4.2 allows remote attackers to execute arbitrary code during authentication. • http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://www.kb.cert.org/vuls/id/913820 http://www.us-cert.gov/cas/techalerts/TA05-229A.html •

CVSS: 5.1EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file. • http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://securitytracker.com/id?1014695 http://www.kb.cert.org/vuls/id/172948 http://www.us-cert.gov/cas/techalerts/TA05-229A.html •