CVE-2005-0972
https://notcve.org/view.php?id=CVE-2005-0972
Integer overflow in the searchfs system call in Mac OS X 10.3.9 and earlier allows local users to execute arbitrary code via crafted parameters. • http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html http://www.kb.cert.org/vuls/id/185702 •
CVE-2005-1331
https://notcve.org/view.php?id=CVE-2005-1331
The AppleScript Editor in Mac OS X 10.3.9 does not properly display script code for an applescript: URI, which can result in code that is different than the actual code that would be run, which could allow remote attackers to trick users into executing malicious code via certain URI characters such as NULL, control characters, and homographs. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://remahl.se/david/vuln/010 http://secunia.com/advisories/15227 http://www.securityfocus.com/bid/13480 http://www.vupen.com/english/advisories/2005/0455 •
CVE-2005-1341
https://notcve.org/view.php?id=CVE-2005-1341
Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://remahl.se/david/vuln/012 http://secunia.com/advisories/15227 http://securitytracker.com/id?1013882 http://www.kb.cert.org/vuls/id/994510 http://www.osvdb.org/16083 http://www.securityfocus.com/bid/13480 http://www.vupen.com/english/advisories/2005/0455 •
CVE-2005-1430
https://notcve.org/view.php?id=CVE-2005-1430
Mac OS X 10.3.x and earlier uses insecure permissions for a pseudo terminal tty (pty) that is managed by a non-setuid program, which allows local users to read or modify sessions of other users. • http://www.security-focus.com/archive/1/397306 •
CVE-2005-0975
https://notcve.org/view.php?id=CVE-2005-0975
Integer signedness error in the parse_machfile function in the mach-o loader (mach_loader.c) for the Darwin Kernel as used in Mac OS X 10.3.7, and other versions before 10.3.9, allows local users to cause a denial of service (CPU consumption) via a crafted mach-o header. • http://felinemenace.org/advisories/macosx.txt http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html http://marc.info/?l=bugtraq&m=110616533903671&w=2 http://secunia.com/advisories/13902 http://securitytracker.com/id?1012941 http://securitytracker.com/id?1013735 http://www.ciac.org/ciac/bulletins/p-185.shtml http://www.securityfocus.com/bid/12314 http://www.vupen.com/english/advisories/2005/0041 https://exchange.xforce.ibmcloud.com/vulnerabilities/18979 •