Page 437 of 2317 results (0.010 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with Admin credentials, does not authenticate the user before installing certain software requiring system privileges. El instalador de aplicaciones en Apple Mac OS X 10.4.8 y anteriores, al ser usado por un usuario con credenciales de administrador, no verifica el usuario antes de instalar cierto software que requiere privilegios de sistema. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017304 http://www.osvdb.org/30733 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

Integer overflow in the fatfile_getarch2 in Apple Mac OS X allows local users to cause a denial of service and possibly execute arbitrary code via a crafted Mach-O Universal program that triggers memory corruption. Desbordamiento de enteros en fatfile_getarch2 en Apple Mac OS X permite a un usuario local provocar denegación de servicio y posiblemente ejecutar código de su elección a través del programa Mach-O Universal manipulado que dispara una corrupción de memoria. • https://www.exploit-db.com/exploits/29190 http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-26-11-2006.html http://secunia.com/advisories/23088 http://secunia.com/advisories/24479 http://www.osvdb.org/30706 http://www.securityfocus.com/bid/21291 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http:// •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 2

Apple Mac OS X kernel allows local users to cause a denial of service via a process that uses kevent to register a queue and an event, then fork a child process that uses kevent to register an event for the same queue as the parent. Núcleo Apple Mac OS X permite a un usuario local provocar denegación de servicio a través de un proceso que usa kevent para registrar una cola o un evento, entonces se bifurca en un proceso hijo que usa kevent para registrar un evento para la misma cola que la del padre. • http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://projects.info-pull.com/mokb/MOKB-24-11-2006.html http://secunia.com/advisories/23114 http://secunia.com/advisories/27643 http://www.osvdb.org/30695 http://www.securityfocus.com/bid/21285 http://www.securityfocus.com/bid/26444 http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2006/4715 http: •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 1

Apple Mac OS X allows local users to cause a denial of service (memory corruption) via a crafted Mach-O binary with a malformed load_command data structure. Apple Mac OS X permite a un usuario local provocar denegación de servicio (memoria corrupta) a través del binario manipulado Mach-O con una estructura de datos mal formada load_command. • http://projects.info-pull.com/mokb/MOKB-23-11-2006.html http://www.osvdb.org/30740 http://www.securityfocus.com/bid/21272 http://www.vupen.com/english/advisories/2006/4714 https://exchange.xforce.ibmcloud.com/vulnerabilities/30549 •

CVSS: 5.1EPSS: 27%CPEs: 2EXPL: 4

Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a malformed UDTO HFS+ disk image, such as with "bad sectors," which triggers memory corruption. Vulnerabilidad no especificada en Apple Mac OSX 10.4.8, y posiblemente otras versiones, permite a atacantes remotos provocar una denegación de servicio (caída) mediante una imagen de disco UDTO HFS+ mal formada, como por ejemplo con "sectores dañados", lo cual provoca una corrupción de memoria. • https://www.exploit-db.com/exploits/29144 https://www.exploit-db.com/exploits/29161 http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-21-11-2006.html http://secunia.com/advisories/23012 http://secunia.com/advisories/23062 http://secunia.com/advisories/24479 http://securitytracker.com/id?1017260 http://www.osvdb.org/30510 http://www.securityfocus.com/bid& •