Page 429 of 2413 results (0.029 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the Bluetooth stack on Mac OS 10.4.7 and earlier has unknown impact and local attack vectors, related to "Mach Exception Handling", a different issue than CVE-2006-6900. Vulnerabilidad no especificada en la pila Bluetooth de Mac OS 10.4.7 y anteriores tiene impacto y vectores de ataque locales desconocidos, relacionados con el "manejo de excepciones Mach", un problema distinto de CVE-2006-????. • http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf http://osvdb.org/36836 http://www.securityfocus.com/archive/1/455889/100/0/threaded •

CVSS: 9.0EPSS: 2%CPEs: 45EXPL: 2

Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 20050914, NetBSD 2.* and 3.* before 20061203, and Apple Mac OS X before 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a long pathname that results from path expansion. Desbordamiento de búfer en la conjunto de la implementación de libc in NetBSD-current versiones anteriores a 20050914, NetBSD 2.* y 3.* versiones anteriores a 20061203, y Apple Mac OSX anterior a 2007-004, tal y como se usan en el demonio FTP y tnftpd, permite a atacantes remotos autenticados ejecutar código de su elección mediante un nombre de ruta largo que resulta de una expansión en la ruta. • https://www.exploit-db.com/exploits/2874 https://www.exploit-db.com/exploits/29204 http://docs.info.apple.com/article.html?artnum=305391 http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-027.txt.asc http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html http://secunia.com/advisories/23178 http://secunia.com/advisories/24966 http://securitytracker.com/id?1017386 http:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.6EPSS: 0%CPEs: 18EXPL: 0

QuickTime for Java on Mac OS X 10.4 through 10.4.8, when used with Quartz Composer, allows remote attackers to obtain sensitive information (screen images) via a Java applet that accesses images that are being rendered by other embedded QuickTime objects. QuickTime para Java en Mac OS X 10.4 hasta 10.4.8, cuando es usado con Quartz Composer, permite a atacantes remotos obtener información sensible (imágenes de la pantalla) mediante un applet de Java que accede a imágenes que han sido renderizadas por otros objetos QuickTime empotrados. • http://docs.info.apple.com/article.html?artnum=304916 http://lists.apple.com/archives/Security-announce/2006/Dec/msg00000.html http://secunia.com/advisories/23438 http://securitytracker.com/id?1017402 http://www.osvdb.org/32380 http://www.securityfocus.com/bid/21672 http://www.vupen.com/english/advisories/2006/5072 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The Apple Type Services (ATS) server in Mac OS X 10.4.8 and earlier does not securely create log files, which allows local users to create and modify arbitrary files via unspecified vectors, possibly relating to a symlink attack. El servidor Apple Type Services (ATS) en Mac OS X 10.4.8 y anteriores no crea archivos de registro de forma segura, lo que permite a atacantes remotos crear y modificar archivos de su elección a través de vectores no especificados, posiblemente relacionados con un ataque de enlace simbólico (symlink attack). • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017301 http://www.kb.cert.org/vuls/id/323424 http://www.osvdb.org/30739 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •

CVSS: 6.8EPSS: 6%CPEs: 19EXPL: 0

WebKit in Apple Mac OS X 10.3.x through 10.3.9 and 10.4 through 10.4.8 allows remote attackers to execute arbitrary code via a crafted HTML file, which accesses previously deallocated objects. WebKit de Apple Mac OS X 10.3.x hasta 10.3.9 y 10.4 hasta 10.4.8 permite a atacantes remotos ejecutar código de su elección mediante un archivo HTML manipulado, que accede a objetos previamente liberados (deallocated). • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017304 http://www.kb.cert.org/vuls/id/848960 http://www.osvdb.org/30726 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 https://exchange.xforce.ibmcloud.com/vulnerabilities/30645 •