Page 152 of 776 results (0.010 seconds)

CVSS: 10.0EPSS: 1%CPEs: 16EXPL: 1

Directory Services in Apple Mac OS X 10.0.2, 10.0.3, 10.2.8, 10.3.2 and Apple Mac OS X Server 10.2 through 10.3.2 accepts authentication server information from unknown LDAP or NetInfo sources as provided by a malicious DHCP server, which allows remote attackers to gain privileges. Los servicios de directorio en Apple Mac OS X 10.0.2, 10.0.3, 10.2.8, 10.3.2 y Apple Mac OS X Server 10.2 a 10.3.2 aceptan información de servidor de autenticación de fuentes LDAP o NetInfo proporcionadas por un servidor DHCP malicioso, lo que permite a atacantes remotos ganar privilegios. • http://docs.info.apple.com/article.html?artnum=32478 http://docs.info.apple.com/article.html?artnum=61798 http://www.carrel.org/dhcp-vuln.html http://www.securityfocus.com/bid/9110 https://exchange.xforce.ibmcloud.com/vulnerabilities/13874 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Unknown vulnerability in Safari web browser for Mac OS X 10.2.8 related to "the display of URLs in the status bar." Vulnerabilidad desconocida en el explorador web Safari para Mac OS X 10.2.8 relacionada con la "visualización" de URLs en la barra de estado. • http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html http://secunia.com/advisories/10959 http://www.kb.cert.org/vuls/id/194238 https://exchange.xforce.ibmcloud.com/vulnerabilities/14993 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in CoreFoundation for Mac OS X 10.3.2, related to "notification logging." Vulnerabilidad desconocida en CoreFoundation para Mac OS X 10.3.3, relacionada con "registro (logging) de notificaciones". • http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html http://secunia.com/advisories/10959 https://exchange.xforce.ibmcloud.com/vulnerabilities/15299 •

CVSS: 5.0EPSS: 3%CPEs: 36EXPL: 1

Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges. Vulnerabilidad de cadena de formato en el demonio de Protocolo Punto-a-Punto (pppd) 2.4.0 de Mac OS X 10.3.2 y anteriores permite a atacantes remotos leer datos arbitrarios del proceso pppd, incluyendo credenciales de autenticación PAP o CHAP, para ganar privilegios. • http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html http://www.atstake.com/research/advisories/2004/a022304-1.txt http://www.kb.cert.org/vuls/id/841742 http://www.osvdb.org/6822 http://www.securityfocus.com/bid/9730 https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

The PKI functionality in Mac OS X 10.2.8 and 10.3.2 allows remote attackers to cause a denial of service (service crash) via malformed ASN.1 sequences. • http://lists.apple.com/archives/security-announce/2003/Dec/msg00001.html http://secunia.com/advisories/10474 http://www.auscert.org.au/render.html?it=3704 http://www.securityfocus.com/bid/9266 •