Page 471 of 2650 results (0.011 seconds)

CVSS: 5.0EPSS: 4%CPEs: 9EXPL: 0

The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to cause a denial of service (resource consumption) via certain public key values in an X.509 certificate that requires extra resources during signature verification. NOTE: this issue may be similar to CVE-2006-2940. El Security Framework de Apple Mac OS X 10.4 hasta 10.4.8 permite a atacantes remotos provocar una denegación de servicio (agotamiento de recursos) mediante determinados valores de clave pública en un certificado X.509 que requiere recursos extra durante la verificación de la firma. NOTA: este problema podría ser similar a CVE-2006-2940. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017298 http://www.osvdb.org/30730 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •

CVSS: 4.0EPSS: 4%CPEs: 1EXPL: 0

The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will crash when a login failure occurs with a valid user name, which allows remote attackers to cause a denial of service (crash) and enumerate valid usernames. El servidor FTP en Apple Mac OS X 10.4.8 y anteriores, cuando el acceso FTP está habilitado, sufre una caída cuando ocurre un intento de acceso erróneo con un nombre de usuario válido, lo que permite a atacantes remotos provocar una denegación de servicio (caída) y enumerar nombres de usuario válidos. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017303 http://www.kb.cert.org/vuls/id/371648 http://www.osvdb.org/30734 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 https://exchange.xforce.ibmcloud.com/vulnerabilities/30621 •

CVSS: 5.1EPSS: 1%CPEs: 1EXPL: 0

Stack-based buffer overflow in the Apple Type Services (ATS) server in Mac OS 10.4.8 and earlier allow user-assisted attackers to execute arbitrary code via crafted font files. Desbordamiento de búfer basado en pila en el servidor Apple Type Services (ATS) de Mac OS 10.4.8 y anteriores permite a atacantes con la intervención del usuario ejecutar código de su elección mediante archivos de fuentes manipulados. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017301 http://www.kb.cert.org/vuls/id/835936 http://www.osvdb.org/30737 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •

CVSS: 7.5EPSS: 2%CPEs: 8EXPL: 0

The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not properly search certificate revocation lists (CRL), which allows remote attackers to access systems by using revoked certificates. El Security Framework en el Apple Mac OS X 10.3.9 y 10.4.x anterior a la 10.4.7, no busca adecuadamente la lista de revocación de certificados (CRL), lo que permite a atacantes remotos el acceso al sistema utilizando certificados revocados. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017298 http://www.osvdb.org/30728 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •

CVSS: 5.1EPSS: 6%CPEs: 1EXPL: 0

Heap-based buffer overflow in the Finder in Apple Mac OS X 10.4.8 and earlier allows user-assisted remote attackers to execute arbitrary code by browsing directories containing crafted .DS_Store files. Desbordamiento de búfer basados en pila en el Finder del Apple Mac OS X 10.4.8 y versiones anteriores, permite a atacantes con la intervención del usuario ejecutar código de su elección mirando los directorios que contienen ficheros .DS_Store manipulados. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017304 http://www.kb.cert.org/vuls/id/258744 http://www.osvdb.org/30735 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 https://exchange.xforce.ibmcloud.com/vulnerabilities/30617 •