Page 35 of 244 results (0.010 seconds)

CVSS: 2.1EPSS: 0%CPEs: 16EXPL: 2

Integer signedness error in the parse_machfile function in the mach-o loader (mach_loader.c) for the Darwin Kernel as used in Mac OS X 10.3.7, and other versions before 10.3.9, allows local users to cause a denial of service (CPU consumption) via a crafted mach-o header. • http://felinemenace.org/advisories/macosx.txt http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html http://marc.info/?l=bugtraq&m=110616533903671&w=2 http://secunia.com/advisories/13902 http://securitytracker.com/id?1012941 http://securitytracker.com/id?1013735 http://www.ciac.org/ciac/bulletins/p-185.shtml http://www.securityfocus.com/bid/12314 http://www.vupen.com/english/advisories/2005/0041 https://exchange.xforce.ibmcloud.com/vulnerabilities/18979 •

CVSS: 2.1EPSS: 0%CPEs: 17EXPL: 0

AFP Server in Mac OS X before 10.3.8 uses insecure permissions for "Drop Boxes," which allows local users to read the contents of a Drop Box. • http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html •

CVSS: 4.6EPSS: 0%CPEs: 17EXPL: 1

The Bluetooth Setup Assistant for Mac OS X before 10.3.8 can be launched without a keyboard or Bluetooth device, which allows local users to bypass access restrictions and gain privileges. • https://www.exploit-db.com/exploits/25256 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html •

CVSS: 7.2EPSS: 0%CPEs: 16EXPL: 2

Stack-based buffer overflow in the Core Foundation Library in Mac OS X 10.3.5 and 10.3.6, and possibly earlier versions, allows local users to execute arbitrary code via a long CF_CHARSET_PATH environment variable. • https://www.exploit-db.com/exploits/2111 https://www.exploit-db.com/exploits/896 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://www.idefense.com/application/poi/display?id=219&type=vulnerabilities http://www.securityfocus.com/bid/13224 •

CVSS: 2.1EPSS: 0%CPEs: 52EXPL: 2

The Finder in Mac OS X and earlier allows local users to overwrite arbitrary files and gain privileges by creating a hard link from the .DS_Store file to an arbitrary file. • https://www.exploit-db.com/exploits/793 http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://marc.info/?l=bugtraq&m=110780124707975&w=2 http://secunia.com/advisories/14188 http://www.securityfocus.com/bid/12458 https://exchange.xforce.ibmcloud.com/vulnerabilities/19253 •