Page 429 of 2432 results (0.011 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the Bluetooth stack in Apple Mac OS 10.4 has unknown impact and attack vectors, related to an "implementation bug." Vulnerabilidad no sepecificada en la pila Bluetooth en Apple Mac OS 10.4 tiene impacto y vectores de ataque desconocidos, relacionados con un "bug de implementación". • http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf http://osvdb.org/37608 http://www.securityfocus.com/archive/1/455889/100/0/threaded •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the Bluetooth stack on Mac OS 10.4.7 and earlier has unknown impact and local attack vectors, related to "Mach Exception Handling", a different issue than CVE-2006-6900. Vulnerabilidad no especificada en la pila Bluetooth de Mac OS 10.4.7 y anteriores tiene impacto y vectores de ataque locales desconocidos, relacionados con el "manejo de excepciones Mach", un problema distinto de CVE-2006-????. • http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf http://osvdb.org/36836 http://www.securityfocus.com/archive/1/455889/100/0/threaded •

CVSS: 9.0EPSS: 2%CPEs: 45EXPL: 2

Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 20050914, NetBSD 2.* and 3.* before 20061203, and Apple Mac OS X before 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a long pathname that results from path expansion. Desbordamiento de búfer en la conjunto de la implementación de libc in NetBSD-current versiones anteriores a 20050914, NetBSD 2.* y 3.* versiones anteriores a 20061203, y Apple Mac OSX anterior a 2007-004, tal y como se usan en el demonio FTP y tnftpd, permite a atacantes remotos autenticados ejecutar código de su elección mediante un nombre de ruta largo que resulta de una expansión en la ruta. • https://www.exploit-db.com/exploits/2874 https://www.exploit-db.com/exploits/29204 http://docs.info.apple.com/article.html?artnum=305391 http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-027.txt.asc http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html http://secunia.com/advisories/23178 http://secunia.com/advisories/24966 http://securitytracker.com/id?1017386 http:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.6EPSS: 0%CPEs: 18EXPL: 0

QuickTime for Java on Mac OS X 10.4 through 10.4.8, when used with Quartz Composer, allows remote attackers to obtain sensitive information (screen images) via a Java applet that accesses images that are being rendered by other embedded QuickTime objects. QuickTime para Java en Mac OS X 10.4 hasta 10.4.8, cuando es usado con Quartz Composer, permite a atacantes remotos obtener información sensible (imágenes de la pantalla) mediante un applet de Java que accede a imágenes que han sido renderizadas por otros objetos QuickTime empotrados. • http://docs.info.apple.com/article.html?artnum=304916 http://lists.apple.com/archives/Security-announce/2006/Dec/msg00000.html http://secunia.com/advisories/23438 http://securitytracker.com/id?1017402 http://www.osvdb.org/32380 http://www.securityfocus.com/bid/21672 http://www.vupen.com/english/advisories/2006/5072 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The Apple Type Services (ATS) server in Mac OS X 10.4.8 and earlier does not securely create log files, which allows local users to create and modify arbitrary files via unspecified vectors, possibly relating to a symlink attack. El servidor Apple Type Services (ATS) en Mac OS X 10.4.8 y anteriores no crea archivos de registro de forma segura, lo que permite a atacantes remotos crear y modificar archivos de su elección a través de vectores no especificados, posiblemente relacionados con un ataque de enlace simbólico (symlink attack). • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017301 http://www.kb.cert.org/vuls/id/323424 http://www.osvdb.org/30739 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •