Page 405 of 2061 results (0.013 seconds)

CVSS: 5.0EPSS: 3%CPEs: 36EXPL: 1

Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges. Vulnerabilidad de cadena de formato en el demonio de Protocolo Punto-a-Punto (pppd) 2.4.0 de Mac OS X 10.3.2 y anteriores permite a atacantes remotos leer datos arbitrarios del proceso pppd, incluyendo credenciales de autenticación PAP o CHAP, para ganar privilegios. • http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html http://www.atstake.com/research/advisories/2004/a022304-1.txt http://www.kb.cert.org/vuls/id/841742 http://www.osvdb.org/6822 http://www.securityfocus.com/bid/9730 https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Unknown vulnerability in the Mail application for Mac OS X 10.1.5 and 10.2.8 with unknown impact, a different vulnerability than CVE-2004-0086. Vulnerabilidad desconocida en la aplicación de correo de Mac OS X 10.1.5 y 10.2.8 con impacto desconocido, una vulnerabilidad distinta de CAN-2004-0086 • http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html http://www.securityfocus.com/bid/9504 https://exchange.xforce.ibmcloud.com/vulnerabilities/14992 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Mac OS X before 10.3 initializes the TCP timestamp with a constant number, which allows remote attackers to determine the system's uptime via the ID field in a TCP packet. Mac OS X anteriores a 10.3 inicializa la marca de tiempo TCP con un número constante, lo que permite a atacantes remotos determinar el tiempo que lleva levantado el sistema mediante el campo ID de un paquete TCP. • http://docs.info.apple.com/article.html?artnum=61798 http://lists.apple.com/mhonarc/security-announce/msg00038.html •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in the Mac OS X kernel 10.2.8 and earlier allows local users, and possibly remote attackers, to cause a denial of service (crash), access portions of memory, and possibly execute arbitrary code via a long command line argument (argv[]). Desbordamiento de búfer en el kernel de Mac OS X 10.2.8 y anteriores permite a usuarios locales, y posiblemente atacantes remotos, causar una denegación de servicio (caída), acceder a porciones de memoria, y posiblemente ejecutar código arbitrario mediante un argumento de línea de comandos largo (argv[]). • http://lists.apple.com/mhonarc/security-announce/msg00038.html http://www.atstake.com/research/advisories/2003/a102803-3.txt http://www.securityfocus.com/bid/8913 https://exchange.xforce.ibmcloud.com/vulnerabilities/13541 •

CVSS: 2.1EPSS: 0%CPEs: 30EXPL: 0

Finder in Mac OS X 10.2.8 and earlier sets global read/write/execute permissions on directories when they are dragged (copied) from a mounted volume such as a disk image (DMG), which could cause the directories to have less restrictive permissions than intended. Finder en Mac OS X 10.2.8 y anteriores establece permisos de lectura/escritura/ejecución globales en directorios cuando son arrastrados (copiados) de un volumen montado, como una imagen de disco (DMG), lo que podría causar que los directorios tuvieran permisos menos restrictivos que los deseados. • http://www.atstake.com/research/advisories/2003/a102803-1.txt http://www.securityfocus.com/bid/8916 http://www.securityfocus.com/bid/8917 https://exchange.xforce.ibmcloud.com/vulnerabilities/13537 •