CVE-2006-0400
https://notcve.org/view.php?id=CVE-2006-0400
CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows remote attackers to bypass the same-origin policy and execute Javascript in other domains via unknown vectors involving "crafted archives." • http://docs.info.apple.com/article.html?artnum=303453 http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html http://secunia.com/advisories/19129 http://securitytracker.com/id?1015763 http://www.osvdb.org/23873 http://www.securityfocus.com/bid/17082 http://www.vupen.com/english/advisories/2006/0949 https://exchange.xforce.ibmcloud.com/vulnerabilities/25208 •
CVE-2006-0396 – Apple Mac OSX 10.4.5 Mail.app - Real Name Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-0396
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment. • https://www.exploit-db.com/exploits/1583 http://docs.info.apple.com/article.html?artnum=303453 http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html http://secunia.com/advisories/19129 http://securitytracker.com/id?1015762 http://www.digitalmunition.com/DMA%5B2006-0313a%5D.txt http://www.kb.cert.org/vuls/id/980084 http://www.osvdb.org/23872 http://www.securityfocus.com/archive/1/427601/100/0/threaded http://www.securityfocus.com/bid/17081 http:/ •
CVE-2006-0397
https://notcve.org/view.php?id=CVE-2006-0397
Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows attackers to trick a user into opening an application that appears to be a safe file type. NOTE: due to the lack of specific information in the vendor advisory, it is not clear how CVE-2006-0397, CVE-2006-0398, and CVE-2006-0399 are different. • http://docs.info.apple.com/article.html?artnum=303453 http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html http://secunia.com/advisories/19129 http://securitytracker.com/id?1015760 http://www.osvdb.org/23869 http://www.vupen.com/english/advisories/2006/0949 https://exchange.xforce.ibmcloud.com/vulnerabilities/25269 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-0398
https://notcve.org/view.php?id=CVE-2006-0398
Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows attackers to trick a user into opening an application that appears to be a safe file type. NOTE: due to the lack of specific information in the vendor advisory, it is not clear how CVE-2006-0397, CVE-2006-0398, and CVE-2006-0399 are different. • http://docs.info.apple.com/article.html?artnum=303453 http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html http://secunia.com/advisories/19129 http://securitytracker.com/id?1015760 http://www.osvdb.org/23870 http://www.vupen.com/english/advisories/2006/0949 https://exchange.xforce.ibmcloud.com/vulnerabilities/25269 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-1220
https://notcve.org/view.php?id=CVE-2006-1220
Integer overflow in the mach_msg_send function in the kernel for Mac OS X might allow local users to execute arbitrary code via unknown attack vectors related to a large message header size, which leads to a heap-based buffer overflow. • http://www.felinemenace.org/~nemo http://www.osvdb.org/28453 http://www.securityfocus.com/bid/17056 •