Page 420 of 2130 results (0.009 seconds)

CVSS: 10.0EPSS: 79%CPEs: 8EXPL: 7

Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO. Error de fuera-por-uno (off-by-one) en la función fb_realpath(), derivada de la función realpath de BSD, pude permitir a atacantes ejecutar código arbitrario, como se ha demostrado en wu-ftpd 2.5.0 a 2.6.2 mediante comandos que causan que nombres de rutas de tamaño MAXPATHLEN+1 disparen un desbordamiento de búfer, incluyendo: (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, y (8) RNTO. • https://www.exploit-db.com/exploits/22976 https://www.exploit-db.com/exploits/78 https://www.exploit-db.com/exploits/74 https://www.exploit-db.com/exploits/22974 https://www.exploit-db.com/exploits/22975 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-011.txt.asc http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0065.html http://download.immunix.org/ImmunixOS/7+/Updates/errata/IMNX-2003-7+-019-01 http://isec.pl/vulnerabilities/isec-0011-wu • CWE-193: Off-by-one Error •

CVSS: 4.6EPSS: 0%CPEs: 14EXPL: 0

The screen saver in MacOS X allows users with physical access to cause the screen saver to crash and gain access to the underlying session via a large number of characters in the password field, possibly triggering a buffer overflow. El salvapantallas de MacOS X permite a usuarios con acceso físico a la máquina hacer que el salvapantallas se caiga y ganar acceso a la sesión subyacente mediante un número de caracteres largo en el campo de contraseña, posiblemente disparando un desbordamiento de búfer. • http://archives.neohapsis.com/archives/bugtraq/2003-07/0034.html http://archives.neohapsis.com/archives/bugtraq/2003-07/0187.html http://docs.info.apple.com/article.html?artnum=120232 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The Kerberos login authentication feature in Mac OS X, when used with an LDAPv3 server and LDAP bind authentication, may send cleartext passwords to the LDAP server when the AuthenticationAuthority attribute is not set. El sistema de autentificación de login de Kerberos sobre Mac OS X, cuando se usua con un servidor LDAPv3 y autentificación LDAP, puede enviar passwords en texto plano al servidor LDAP si no está fijado el atributo AuthenticationAuthority • http://docs.info.apple.com/article.html?artnum=107579 http://www.kb.cert.org/vuls/id/467828 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

IPSec in Mac OS X before 10.2.6 does not properly handle certain incoming security policies that match by port, which could allow traffic that is not explicitly allowed by the policies. IPSec en Mac OS X anterior a la 10.2.6 no maneja correctamente ciertas políticas de seguridad asignadas por puerto, lo que permitiría tráfico que no está explícitamente permitido por esas políticas. • http://docs.info.apple.com/article.html?artnum=61798 http://secunia.com/advisories/8798 http://securitytracker.com/id?1006796 http://www.kb.cert.org/vuls/id/869548 http://www.securityfocus.com/bid/7628 https://exchange.xforce.ibmcloud.com/vulnerabilities/12027 •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 1

DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program. DirectoryServices en MacOS X se fia de la variable de entorno PATH para localizar y ejecutar el comando touch, lo que permite a usurarios locales ejecutar comandos arbitrarios modificando PATH para que apunte a un directorio que contenga un programa 'touch' malicioso. • https://www.exploit-db.com/exploits/15 http://lists.apple.com/mhonarc/security-announce/msg00028.html http://www.atstake.com/research/advisories/2003/a041003-1.txt •