Page 411 of 2317 results (0.014 seconds)

CVSS: 10.0EPSS: 4%CPEs: 20EXPL: 0

Double free vulnerability in the Networking component in Apple Mac OS X 10.4 through 10.4.10 allows remote attackers to cause a denial of service (system shutdown) or execute arbitrary code via crafted IPV6 packets. Una vulnerabilidad de doble liberación en el componente Networking en Apple Mac OS X versiones 10.4 hasta 10.4.10, permite a atacantes remotos causar una denegación de servicio (apagado del sistema) o ejecutar código arbitrario por medio de paquetes IPV6 diseñados. • http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://secunia.com/advisories/27643 http://securitytracker.com/id?1018950 http://www.securityfocus.com/bid/26444 http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2007/3868 https://exchange.xforce.ibmcloud.com/vulnerabilities/38474 • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 20EXPL: 0

Integer signedness error in the ttioctl function in bsd/kern/tty.c in the xnu kernel in Apple Mac OS X 10.4 through 10.4.10 allows local users to cause a denial of service (system shutdown) or gain privileges via a crafted TIOCSETD ioctl request. Un error en la propiedad signedness de enteros en la función ttioctl en el archivo bsd/kern/tty.c en el Kernel xnu en Apple Mac OS X versiones 10.4 hasta 10.4.10, permite a usuarios locales causar una denegación de servicio (apagado del sistema) o alcanzar privilegios por medio de una petición ioctl TIOCSETD diseñada. • http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://secunia.com/advisories/27643 http://securitytracker.com/id?1018950 http://www.securityfocus.com/archive/1/483753/100/200/threaded http://www.securityfocus.com/bid/26444 http://www.trapkit.de/advisories/TKADV2007-001.txt http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2007/3868 https://exchange.xfor • CWE-189: Numeric Errors •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 0

Stack-based buffer overflow in the Networking component in Apple Mac OS X 10.4 through 10.4.10 allows local users to execute arbitrary code via a crafted IOCTL request that adds an AppleTalk zone to a routing table. Un desbordamiento de búfer en la región stack de la memoria en el componente Networking en Apple Mac OS X versiones 10.4 hasta 10.4.10, permite a usuarios locales ejecutar código arbitrario por medio de una petición IOCTL diseñada que agrega una zona de AppleTalk en una tabla de enrutamiento. • http://docs.info.apple.com/article.html?artnum=307041 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=627 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://secunia.com/advisories/27643 http://securitytracker.com/id?1018950 http://www.securityfocus.com/bid/26444 http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2007/3868 https://exchange.xforce.ibmcloud.com/vulnerabilities/38475 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 2%CPEs: 20EXPL: 0

Unspecified vulnerability in WebCore in Apple Mac OS X 10.4 through 10.4.10 allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via unknown vectors related to browser history, which triggers memory corruption. Vulnerabilidad sin especificar en el WebCore del Apple Mac OS X 10.4 hasta el 10.4.10 permite a atacantes remotos provocar una denegación de servicio (terminación de la aplicación) o ejecutar código de su elección a través de vectores desconocidos relacionados con el histórico del navegador, lo que dispara una corrupción de memoria. • http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://secunia.com/advisories/27643 http://securitytracker.com/id?1018948 http://www.securityfocus.com/bid/26444 http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2007/3868 https://exchange.xforce.ibmcloud.com/vulnerabilities/38483 •

CVSS: 7.2EPSS: 0%CPEs: 20EXPL: 0

The SecurityAgent component in Mac OS X 10.4 through 10.4.10 allows attackers with physical access to bypass the authentication dialog of the screen saver and send keystrokes to a process, related to "handling of keyboard focus between secure text fields." El componente SecurityAgent de Mac OS X 10.4 hasta 10.4.10 permite a atacantes con acceso físico evitar el diálogo de autenticación del salvapantallas y enviar pulsaciones de teclado a un proceso, relacionado con "el manejo del foco de teclado entre campos de texto seguros". • http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://secunia.com/advisories/27643 http://securitytracker.com/id?1018951 http://www.securityfocus.com/bid/26444 http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2007/3868 https://exchange.xforce.ibmcloud.com/vulnerabilities/38480 • CWE-287: Improper Authentication •