Page 459 of 2650 results (0.023 seconds)

CVSS: 4.6EPSS: 0%CPEs: 10EXPL: 0

The Login Window in Apple Mac OS X 10.4 through 10.4.9 displays the software update window beneath the loginwindow authentication dialog in certain circumstances related to running scheduled tasks, which allows local users to bypass authentication controls. La ventana de Login en Apple Mac OS X 10.4 hasta la 10.4.9 muestra la ventana de actualización bajo el diálogo de la autentificación de ventana de entrada en ciertas circustancias relacionadas con la ejecución de tareas programadas, lo cual podría ser utilizado por usuarios locales para evitar controles de validación. • http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://secunia.com/advisories/24966 http://www.osvdb.org/34864 http://www.securityfocus.com/bid/23569 http://www.securitytracker.com/id?1017939 http://www.us-cert.gov/cas/techalerts/TA07-109A.html http://www.vupen.com/english/advisories/2007/1470 •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 0

SMB in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environment when executing commands, which allows local users to gain privileges by setting unspecified environment variables. SMB en Apple Mac OS X 10.3.9 hasta la 10.4.9 no limpia de forma adecuada el entorno cuando se ejecutar comandos, lo cual permite a usuarios locales ganar privilegios a través de la configuración de variables de entorno no especificadas. • http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://secunia.com/advisories/24966 http://www.osvdb.org/34868 http://www.securityfocus.com/bid/23569 http://www.us-cert.gov/cas/techalerts/TA07-109A.html http://www.vupen.com/english/advisories/2007/1470 •

CVSS: 10.0EPSS: 5%CPEs: 22EXPL: 0

Heap-based buffer overflow in the VideoConference framework in Apple Mac OS X 10.3.9 through 10.4.9 allows remote attackers to execute arbitrary code via a "crafted SIP packet when initializing an audio/video conference". Desbordamiento de búfer basado en pila en el marco VideoConference en Apple Mac OS X 10.3.9 hasta la 10.4.9 permite a atacantes remotos ejecutar código de su elección a través de un "paquete manipulado SIP cuando se inicializa una conferencia audio/video". • http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://secunia.com/advisories/24966 http://www.kb.cert.org/vuls/id/969969 http://www.osvdb.org/34870 http://www.securityfocus.com/bid/23569 http://www.securitytracker.com/id?1017942 http://www.us-cert.gov/cas/techalerts/TA07-109A.html http://www.vupen.com/english/advisories/2007/1470 •

CVSS: 7.2EPSS: 0%CPEs: 68EXPL: 0

Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environment before executing commands, which allows local users to gain privileges by setting unspecified environment variables. El cliente Apple File Protocol (AFP) en Apple Mac OS X 10.3.9 hasta la 10.4.9 no limpia de forma adecuada el entorno antes de la ejecución de comandos, lo cual permite a usuarios locales ganar privilegios a través de la configuración de variables de entorno no especificadas. • http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://secunia.com/advisories/24966 http://www.kb.cert.org/vuls/id/312424 http://www.osvdb.org/34858 http://www.securityfocus.com/bid/23569 http://www.securitytracker.com/id?1017944 http://www.us-cert.gov/cas/techalerts/TA07-109A.html http://www.vupen.com/english/advisories/2007/1470 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 0

Buffer overflow in the AirPortDriver module for AirPort in Apple Mac OS X 10.3.9 through 10.4.9, when running on hardware with the original AirPort wireless card, allows local users to execute arbitrary code by "sending malformed control commands." Desbordamiento de búfer en el módulo AirPortDriver para AirPort en Apple Mac OS X 10.3.9 hasta 10.4.9, al ejecutarse en hardware con la tarjeta wireless AirPort original, permite a usuarios locales ejecutar código de su elección "enviando comandos de control mal formados". • http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://secunia.com/advisories/24966 http://www.osvdb.org/34857 http://www.securityfocus.com/bid/23569 http://www.us-cert.gov/cas/techalerts/TA07-109A.html http://www.vupen.com/english/advisories/2007/1470 •