Page 31 of 220 results (0.008 seconds)

CVSS: 6.8EPSS: 0%CPEs: 32EXPL: 2

passwd in Directory Services in Mac OS X 10.3.x before 10.3.9 and 10.4.x before 10.4.5 allows local users to create arbitrary world-writable files as root by specifying an alternate file in the password database option. • https://www.exploit-db.com/exploits/1545 http://docs.info.apple.com/article.html?artnum=303382 http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html http://secunia.com/advisories/19064 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=400 http://www.osvdb.org/23646 http://www.securityfocus.com/archive/1/426535/100/0/threaded http://www.securityfocus.com/bid/16907 http://www.securityfocus.com/bid/16910 http://www.us-cert.gov/cas/techa •

CVSS: 6.8EPSS: 0%CPEs: 32EXPL: 1

passwd in Directory Services in Mac OS X 10.3.x before 10.3.9 and 10.4.x before 10.4.5 allows local users to overwrite arbitrary files via a symlink attack on the .pwtmp.[PID] temporary file. • http://docs.info.apple.com/article.html?artnum=303382 http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html http://secunia.com/advisories/19064 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=400 http://www.osvdb.org/23647 http://www.securityfocus.com/archive/1/426535/100/0/threaded http://www.securityfocus.com/bid/16907 http://www.securityfocus.com/bid/16910 http://www.us-cert.gov/cas/techalerts/TA06-062A.html http://www.vupen.com& • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 11%CPEs: 75EXPL: 3

The khtml::RenderTableSection::ensureRows function in KHTMLParser in Apple Mac OS X 10.4.3 and earlier, as used by Safari and TextEdit, allows remote attackers to cause a denial of service (memory consumption and application crash) via HTML files with a large ROWSPAN attribute in a TD tag. • https://www.exploit-db.com/exploits/26971 http://docs.info.apple.com/article.html?artnum=303382 http://docs.info.apple.com/jarticle.html?artnum=303382-en http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html http://secunia.com/advisories/18220 http://secunia.com/advisories/19064 http://security-protocols.com/advisory/sp-x22-advisory.txt http://www.kb.cert.org/vuls/id/351217 http://www.securityfocus.com/bid/16045 http://www.securityfocus.com/bid/16907 •

CVSS: 7.5EPSS: 8%CPEs: 28EXPL: 0

Heap-based buffer overflow in CoreFoundation in Mac OS X and OS X Server 10.4 through 10.4.3 allows remote attackers to execute arbitrary code via unknown attack vectors involving "validation of URLs." • http://docs.info.apple.com/article.html?artnum=302847 http://secunia.com/advisories/17813 http://securitytracker.com/id?1015285 http://www.osvdb.org/21271 http://www.securityfocus.com/bid/15647 http://www.vupen.com/english/advisories/2005/2659 https://exchange.xforce.ibmcloud.com/vulnerabilities/23329 •

CVSS: 2.1EPSS: 0%CPEs: 62EXPL: 0

Keychain Access in Mac OS X 10.4.2 and earlier keeps a password visible even if a keychain times out while the password is being viewed, which could allow attackers with physical access to obtain the password. • http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html http://secunia.com/advisories/17368 http://securitytracker.com/id?1015126 http://www.osvdb.org/20430 http://www.securityfocus.com/bid/15252 http://www.vupen.com/english/advisories/2005/2256 https://exchange.xforce.ibmcloud.com/vulnerabilities/44462 •