Page 28 of 144 results (0.006 seconds)

CVSS: 7.5EPSS: 3%CPEs: 86EXPL: 0

Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. • http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.linuxcompatible.org/print42495.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html http://www.securityfocus.com/bid/11347 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type •

CVSS: 5.1EPSS: 10%CPEs: 2EXPL: 3

Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field. Desbordamiento de búfer basado en la pila en AppleFileServer de MAC OS X 10.3.3 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante un paquete LoginExt para un método de autenticación de usuario (User Authentication Method - UAM) con contraseña en texto plano con un arguemento PathName que incluye un cadena de tipo de AFPName más larga que el campo de longitud asociado. • https://www.exploit-db.com/exploits/16863 https://www.exploit-db.com/exploits/9931 https://www.exploit-db.com/exploits/391 http://lists.apple.com/mhonarc/security-announce/msg00049.html http://secunia.com/advisories/11539 http://securitytracker.com/id?1010039 http://www.atstake.com/research/advisories/2004/a050304-1.txt http://www.kb.cert.org/vuls/id/648406 http://www.securiteam.com/securitynews/5QP0115CUO.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16049 •

CVSS: 7.2EPSS: 0%CPEs: 36EXPL: 3

Buffer overflow in cd9660.util in Apple Mac OS X 10.0 through 10.3.2 and Apple Mac OS X Server 10.0 through 10.3.2 may allow local users to execute arbitrary code via a long command line parameter. Desbordamiento de búfer en cd9660.util de Apple Mac OS X 10.0 a 10.3.2 y Apple Mac OS X Server 10.0 a 10.3.2 puede permitir a usuarios locales ejecutar código arbitrario mediante un parámetro de línea de comandos largo. • https://www.exploit-db.com/exploits/23442 http://docs.info.apple.com/article.html?artnum=61798 http://www.kb.cert.org/vuls/id/878526 http://www.securityfocus.com/archive/1/347578 http://www.securityfocus.com/archive/1/347707 http://www.securityfocus.com/archive/1/348097 http://www.securityfocus.com/bid/9228 https://exchange.xforce.ibmcloud.com/vulnerabilities/13995 •

CVSS: 5.0EPSS: 3%CPEs: 36EXPL: 1

Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges. Vulnerabilidad de cadena de formato en el demonio de Protocolo Punto-a-Punto (pppd) 2.4.0 de Mac OS X 10.3.2 y anteriores permite a atacantes remotos leer datos arbitrarios del proceso pppd, incluyendo credenciales de autenticación PAP o CHAP, para ganar privilegios. • http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html http://www.atstake.com/research/advisories/2004/a022304-1.txt http://www.kb.cert.org/vuls/id/841742 http://www.osvdb.org/6822 http://www.securityfocus.com/bid/9730 https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 •

CVSS: 2.1EPSS: 0%CPEs: 30EXPL: 0

Finder in Mac OS X 10.2.8 and earlier sets global read/write/execute permissions on directories when they are dragged (copied) from a mounted volume such as a disk image (DMG), which could cause the directories to have less restrictive permissions than intended. Finder en Mac OS X 10.2.8 y anteriores establece permisos de lectura/escritura/ejecución globales en directorios cuando son arrastrados (copiados) de un volumen montado, como una imagen de disco (DMG), lo que podría causar que los directorios tuvieran permisos menos restrictivos que los deseados. • http://www.atstake.com/research/advisories/2003/a102803-1.txt http://www.securityfocus.com/bid/8916 http://www.securityfocus.com/bid/8917 https://exchange.xforce.ibmcloud.com/vulnerabilities/13537 •