Page 282 of 2946 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Apple Online Store Kit in Apple OS X before 10.11 improperly validates iCloud keychain item ACLs, which allows attackers to obtain access to keychain items via a crafted app. Apple Online Store Kit en Apple OS X en versiones anteriores a 10.11 valida de manera incorrecta el elemento ACLs del llavero, lo que permite a atacantes obtener acceso a elementos del llavero a través de una app manipulada. • http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html http://www.securitytracker.com/id/1033703 https://support.apple.com/HT205267 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

libxpc in launchd in Apple OS X before 10.11 does not restrict the creation of processes for network connections, which allows remote attackers to cause a denial of service (resource consumption) by repeatedly connecting to the SSH port, a different vulnerability than CVE-2015-7761. libxpc en launchd en Apple OS X en versiones anteriores a 10.11 no restringe la creación de procesos para conexiones de red, lo que permite a atacantes remotos causar una denegación de servicio (consumo de recursos) conectando repetidamente al puerto SSH, una vulnerabilidad diferente a CVE-2015-7761. • http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html http://www.securityfocus.com/bid/76908 http://www.securitytracker.com/id/1033703 https://support.apple.com/HT205267 • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The Login Window component in Apple OS X before 10.11 does not ensure that the screen is locked at the intended time, which allows physically proximate attackers to obtain access by visiting an unattended workstation. El componente Login Window en Apple OS X en versiones anteriores a 10.11 no asegura que la pantalla esté bloqueada el tiempo previsto, lo que permite a atacantes físicamente próximos obtener acceso visitando una estación de trabajo desatendida. • http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html http://www.securityfocus.com/bid/76908 http://www.securitytracker.com/id/1033703 https://support.apple.com/HT205267 • CWE-254: 7PK - Security Features •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

IOHIDFamily in Apple OS X before 10.11 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. IOHIDFamily en Apple OS X en versiones anteriores a 10.11 permite a atacantes ejecutar código arbitrario en un contexto privilegiado o causar una denegación de servicio (corrupción de memoria) a través de una app manipulada. • http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html http://www.securityfocus.com/bid/76908 http://www.securitytracker.com/id/1033703 https://support.apple.com/HT205267 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data. La implementación del Handshake Protocol de TLS en Secure Transport en Apple OS X en versiones anteriores a 10.11 acepta un mensaje Certificate Request en una sesión en la cual no ha sido enviado un mensaje Server Key Exchange, lo que permite a atacantes remotos tener un impacto no especificado a través de datos TLS manipulados. • http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html http://www.securityfocus.com/bid/76908 http://www.securitytracker.com/id/1033703 https://support.apple.com/HT205267 • CWE-17: DEPRECATED: Code •