Page 403 of 2650 results (0.011 seconds)

CVSS: 10.0EPSS: 9%CPEs: 19EXPL: 0

Buffer overflow in the kernel in Apple Mac OS X 10.5 before 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a crafted AppleTalk response packet. Desbordamiento de búfer en el núcleo de Apple Mac OS X v10.5 anteriores a v10.5.8 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (caída del sistema) a través de un paquete de respuesta AppleTalk manipulado. • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://osvdb.org/56838 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://www.securityfocus.com/bid/35954 http://www.securitytracker.com/id?1022674 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52435 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

MobileMe in Apple Mac OS X 10.5 before 10.5.8 does not properly delete credentials upon signout from the preference pane, which makes it easier for attackers to hijack a MobileMe session via unspecified vectors, related to a "logic issue." MobileMe en Apple Mac OS X 10.5 anterior a v10.5.8 no elimina adecuadamente las credenciales al salir del panel de preferencias, lo cual hace más fácil para los atacantes secuestrar una sesión MobileMe a través de vectores no especificados, relacionado con una "cuestión lógica". • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://osvdb.org/56839 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://www.securityfocus.com/bid/35954 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52432 • CWE-255: Credentials Management Errors •

CVSS: 6.8EPSS: 10%CPEs: 44EXPL: 0

Stack-based buffer overflow in Image RAW in Apple Mac OS X 10.5 before 10.5.8, and 10.4 before Digital Camera RAW Compatibility Update 2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Canon RAW image. Desbordamiento de Pila basado en búfer en Image RAW en Apple Mac OS X v10.5 anterior a v10.5.8, y v10.4 anterior a Digital Camera RAW Compatibility Update v2.6(actualización de compatibilidad con cámara digital RAW v2.6), permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (cuelgue de aplicación) a través de una imagen Canon RAW manipulada. • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://osvdb.org/56843 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://www.securityfocus.com/bid/35954 http://www.securitytracker.com/id?1022674 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52423 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 3%CPEs: 20EXPL: 0

launchd in Apple Mac OS X 10.5 before 10.5.8 allows remote attackers to cause a denial of service (individual service outage) by making many connections to an inetd-based launchd service. launchd en Apple Mac OS X v10.5 anterior a v10.5.8 permite a atacantes remotos provocar una denegación de servicio (corte de servicio individual) haciendo muchas conexiones a un servicio lanzado basado en inetd-based. • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://osvdb.org/56841 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://www.securityfocus.com/bid/35954 http://www.securitytracker.com/id?1022672 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52425 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 0

Format string vulnerability in Login Window in Apple Mac OS X 10.4.11 and 10.5 before 10.5.8 allows attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in an application name. Vulnerabilidad de formato de cadena en la ventana de inicio de sesión (Login Window) en Apple Mac OS X v10.4.11 y v10.5 anterior a v10.5.8 permite a atacantes ejecutar código arbitrario o causar una denegación de servicio (cuelgue de aplicación) a través de especificadores de formato de cadena en un nombre de aplicación. • http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html http://osvdb.org/56840 http://secunia.com/advisories/36096 http://support.apple.com/kb/HT3757 http://www.securityfocus.com/bid/35954 http://www.us-cert.gov/cas/techalerts/TA09-218A.html http://www.vupen.com/english/advisories/2009/2172 https://exchange.xforce.ibmcloud.com/vulnerabilities/52428 • CWE-134: Use of Externally-Controlled Format String •