Page 28 of 146 results (0.010 seconds)

CVSS: 7.5EPSS: 3%CPEs: 86EXPL: 0

Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. • http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.linuxcompatible.org/print42495.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html http://www.securityfocus.com/bid/11347 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type •

CVSS: 5.1EPSS: 10%CPEs: 2EXPL: 3

Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field. Desbordamiento de búfer basado en la pila en AppleFileServer de MAC OS X 10.3.3 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante un paquete LoginExt para un método de autenticación de usuario (User Authentication Method - UAM) con contraseña en texto plano con un arguemento PathName que incluye un cadena de tipo de AFPName más larga que el campo de longitud asociado. • https://www.exploit-db.com/exploits/16863 https://www.exploit-db.com/exploits/9931 https://www.exploit-db.com/exploits/391 http://lists.apple.com/mhonarc/security-announce/msg00049.html http://secunia.com/advisories/11539 http://securitytracker.com/id?1010039 http://www.atstake.com/research/advisories/2004/a050304-1.txt http://www.kb.cert.org/vuls/id/648406 http://www.securiteam.com/securitynews/5QP0115CUO.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16049 •

CVSS: 7.2EPSS: 0%CPEs: 36EXPL: 3

Buffer overflow in cd9660.util in Apple Mac OS X 10.0 through 10.3.2 and Apple Mac OS X Server 10.0 through 10.3.2 may allow local users to execute arbitrary code via a long command line parameter. Desbordamiento de búfer en cd9660.util de Apple Mac OS X 10.0 a 10.3.2 y Apple Mac OS X Server 10.0 a 10.3.2 puede permitir a usuarios locales ejecutar código arbitrario mediante un parámetro de línea de comandos largo. • https://www.exploit-db.com/exploits/23442 http://docs.info.apple.com/article.html?artnum=61798 http://www.kb.cert.org/vuls/id/878526 http://www.securityfocus.com/archive/1/347578 http://www.securityfocus.com/archive/1/347707 http://www.securityfocus.com/archive/1/348097 http://www.securityfocus.com/bid/9228 https://exchange.xforce.ibmcloud.com/vulnerabilities/13995 •

CVSS: 2.1EPSS: 0%CPEs: 30EXPL: 0

Finder in Mac OS X 10.2.8 and earlier sets global read/write/execute permissions on directories when they are dragged (copied) from a mounted volume such as a disk image (DMG), which could cause the directories to have less restrictive permissions than intended. Finder en Mac OS X 10.2.8 y anteriores establece permisos de lectura/escritura/ejecución globales en directorios cuando son arrastrados (copiados) de un volumen montado, como una imagen de disco (DMG), lo que podría causar que los directorios tuvieran permisos menos restrictivos que los deseados. • http://www.atstake.com/research/advisories/2003/a102803-1.txt http://www.securityfocus.com/bid/8916 http://www.securityfocus.com/bid/8917 https://exchange.xforce.ibmcloud.com/vulnerabilities/13537 •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 1

DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program. DirectoryServices en MacOS X se fia de la variable de entorno PATH para localizar y ejecutar el comando touch, lo que permite a usurarios locales ejecutar comandos arbitrarios modificando PATH para que apunte a un directorio que contenga un programa 'touch' malicioso. • https://www.exploit-db.com/exploits/15 http://lists.apple.com/mhonarc/security-announce/msg00028.html http://www.atstake.com/research/advisories/2003/a041003-1.txt •