Page 19 of 200 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

24 Sep 2004 — The CFPlugIn in Core Foundation framework in Mac OS X allows user supplied libraries to be loaded, which could allow local users to gain privileges. • http://secunia.com/advisories/12491 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

24 Sep 2004 — QuickTime Streaming Server in Mac OS X Server 10.2.8, 10.3.4, and 10.3.5 allows remote attackers to cause a denial of service (application deadlock) via a certain sequence of operations. • http://marc.info/?l=bugtraq&m=109467471617466&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

07 Sep 2004 — Buffer overflow in The Core Foundation framework (CoreFoundation.framework) in Mac OS X 10.2.8, 10.3.4, and 10.3.5 allows local users to execute arbitrary code via a certain environment variable. • http://secunia.com/advisories/12491 •

CVSS: 9.1EPSS: 0%CPEs: 70EXPL: 0

07 Sep 2004 — OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. • http://secunia.com/advisories/12491 •

CVSS: 7.5EPSS: 0%CPEs: 28EXPL: 0

12 Aug 2004 — Safari in Mac OS X before 10.3.5, after sending form data using the POST method, may re-send the data to a GET method URL if that URL is redirected after the POST data and the user uses the forward or backward buttons, which may cause an information leak. Safari para Mac OS X anteriores a 10.3.5, despues de enviar datos de formualarios con el método POST, puede reenviar los datos a un método GET si esa URL es redirigida después de que los datos POST y el usuario utiliza los botones "Atrás" y "Adelante", lo ... • http://lists.apple.com/mhonarc/security-announce/msg00056.html •

CVSS: 7.5EPSS: 0%CPEs: 28EXPL: 0

12 Aug 2004 — The TCP/IP Networking component in Mac OS X before 10.3.5 allows remote attackers to cause a denial of service (memory and resource consumption) via a "Rose Attack" that involves sending a subset of small IP fragments that do not form a complete, larger packet. El componente de red TCP/IP de Mac OS X anteriores a 10.3.5 permite a atacantes remotos causar una denegación de servicio (consumición de recursos) mediante un "Ataque de Rosa" en el que se usan ciertos fragmentos IP. • http://digital.net/~gandalf/Rose_Frag_Attack_Explained.txt •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

11 Jun 2004 — LaunchServices in Mac OS X 10.3.4 and 10.2.8 automatically registers and executes new applications, which could allow attackers to execute arbitrary code without warning the user. LaunchServices en Mac OS X 10.3.4 y 10.2.8 registra automáticamente y ejecuta aplicaciones nuevas, lo que podría permitir a atacantes ejecutar código arbitrario sin avisar al usuario. • http://docs.info.apple.com/article.html?artnum=25785 •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

11 Jun 2004 — The "Show in Finder" button in the Safari web browser in Mac OS X 10.3.4 and 10.2.8 may execute downloaded applications, which could allow remote attackers to execute arbitrary code. El botón "Show in Finder" en el navegador web Safari de Mac OS X 10.3.4 y 10.2.8 puede ejecutar aplicaciones descargadas, lo que pódría permitir a atacantes remotos ejecutar código arbitrario. • http://docs.info.apple.com/article.html?artnum=25785 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

03 Jun 2004 — Unknown vulnerability in LoginWindow for Mac OS X 10.3.4, related to "handling of directory services lookups." Vulnerabilidad desconocida en LoginWindow de Mac OS X 10.3.4, relacionada con "manejo de consultas de servicios de directorio" • http://lists.seifried.org/pipermail/security/2004-May/003743.html •

CVSS: 9.1EPSS: 0%CPEs: 8EXPL: 0

03 Jun 2004 — Unknown vulnerability in LoginWindow for Mac OS X 10.3.4, related to "handling of console log files." Vulnerabilidad desconocida en LoginWindow de Mac OS X 10.3.4, relacionada con "manejo de ficheros de registro de consola" • http://lists.seifried.org/pipermail/security/2004-May/003743.html •