Page 479 of 2946 results (0.015 seconds)

CVSS: 7.6EPSS: 0%CPEs: 10EXPL: 0

Race condition in Login Window in Apple Mac OS X 10.5 through 10.5.4, when a blank-password account is enabled, allows attackers to bypass password authentication and login to any account via multiple attempts to login to the blank-password account, followed by selection of an arbitrary account from the user list. Condición de carrera en Login Window en Apple Mac OS X 10.5 a la 10.5.4, cuando una está activada una cuenta de usuario sin contraseña, permite a atacantes evitar la autenticación a cualquier cuenta mediante múltiples intentos de validación con una cuenta sin contraseña, seguida por una selección de su elección de la lista de cuentas de usuarios. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html http://secunia.com/advisories/31882 http://securitytracker.com/id?1020878 http://www.securityfocus.com/bid/31189 http://www.us-cert.gov/cas/techalerts/TA08-260A.html http://www.vupen.com/english/advisories/2008/2584 https://exchange.xforce.ibmcloud.com/vulnerabilities/45170 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Remote Management and Screen Sharing in Apple Mac OS X 10.5 through 10.5.4, when used to set a password for a VNC viewer, displays additional input characters beyond the maximum password length, which might make it easier for attackers to guess passwords that the user believed were longer. Remote Management y Screen Sharing en Apple Mac OS X 10.5 a la v10.5.4, cuando se usa para establecer una contraseña para el visor VNC, muestra los caracteres adicionales más allá del máximo tamaño de contraseña, lo que puede facilitar a los atacantes obtener contraseñas cuyos usuarios pensaban que eran mayores. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html http://securitytracker.com/id?1020882 http://www.securityfocus.com/bid/31189 http://www.us-cert.gov/cas/techalerts/TA08-260A.html http://www.vupen.com/english/advisories/2008/2584 https://exchange.xforce.ibmcloud.com/vulnerabilities/45174 • CWE-255: Credentials Management Errors •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

The File Sharing pane in the Sharing preference pane in Apple Mac OS X 10.5 through 10.5.4 does not inform users that the complete contents of their own home directories are shared for their own use, which might allow attackers to leverage other vulnerabilities and access files for which sharing was unintended. El Panel File Sharing en las preferencias Sharing en Apple Mac OS X 10.5 a la v10.5.4, no informa a los usuarios del contenido completo de que su directorio personal está siendo compartido para uso propio, lo que podría permitir a atacantes aprovechar otras vulnerabilidades y acceder a ficheros que no está compartidos intencionadamente. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html http://securitytracker.com/id?1020883 http://www.kb.cert.org/vuls/id/126787 http://www.securityfocus.com/bid/31189 http://www.us-cert.gov/cas/techalerts/TA08-260A.html http://www.vupen.com/english/advisories/2008/2584 https://exchange.xforce.ibmcloud.com/vulnerabilities/45175 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

The kernel in Apple Mac OS X 10.5 through 10.5.4 does not properly flush cached credentials during recycling (aka purging) of a vnode, which might allow local users to bypass the intended read or write permissions of a file. kernel en Apple Mac OS X 10.5 a la 10.5.4 no limpia adecuadamente las credenciales cacheadas durante el reciclaje (también conocido como purgado) de un "vnode", lo que permite a usuarios locales evitar los permisos de lectura y escritura establecidos de manera previa. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html http://secunia.com/advisories/31882 http://www.securityfocus.com/bid/31189 http://www.securitytracker.com/id?1020877 http://www.us-cert.gov/cas/techalerts/TA08-260A.html http://www.vupen.com/english/advisories/2008/2584 https://exchange.xforce.ibmcloud.com/vulnerabilities/45169 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 3%CPEs: 12EXPL: 0

VideoConference in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via vectors involving H.264 encoded media. VideoConference en Apple Mac OS X 10.4.11 y 10.5 a la v 10.5.4, permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria y caída de aplicación) o ejecutar código de su elección a través de vectores involucrados con el codec/encoder H.264. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html http://secunia.com/advisories/31882 http://securitytracker.com/id?1020885 http://www.securityfocus.com/bid/31189 http://www.us-cert.gov/cas/techalerts/TA08-260A.html http://www.vupen.com/english/advisories/2008/2584 https://exchange.xforce.ibmcloud.com/vulnerabilities/45177 • CWE-399: Resource Management Errors •