Page 493 of 2946 results (0.013 seconds)

CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 1

Directory traversal vulnerability in ContentServer.py in the Wiki Server in Apple Mac OS X 10.5.2 (aka Leopard) allows remote authenticated users to write arbitrary files via ".." sequences in file attachments. Vulnerabilidad de salto de directorio deContentServer.py en the Wiki Server en Apple Mac OS X 10.5.2 (Leopard), permite a usuarios autenticados remotamente escribir ficheros de su elección a través de secuencias ".." en los ficheros adjuntos. • https://www.exploit-db.com/exploits/31412 http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://secunia.com/advisories/29420 http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=2189 http://www.securityfocus.com/archive/1/489786/100/0/threaded http://www.securityfocus.com/bid/28278 http://www.securitytracker.com/id?1019660 http://www.vupen.com/english/advisories/2008/0924/references • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure websites via data in a 502 Bad Gateway error. CFNetwork en Apple Mac OS X versión 10.4.11, permite que los servidores proxy HTTPS remotos falsifiquen sitios web seguros por medio de datos en un error 502 Bad Gateway. • http://docs.info.apple.com/article.html?artnum=307562 http://docs.info.apple.com/article.html?artnum=307563 http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://secunia.com/advisories/29420 http://secunia.com/advisories/31074 http://www.securityfocus.com/bid/28290 http://www.securityfocus.com/bid/28356 http://www.securitytracker.com/id?1019655 http://www.us-cert.gov/cas/te • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

AppKit in Apple Mac OS X 10.4.11 inadvertently makes an NSApplication mach port available for inter-process communication instead of inter-thread communication, which allows local users to execute arbitrary code via crafted messages to privileged applications. AppKit en Apple Mac OS X versión 10.4.11, inadvertidamente realiza una habilitación de un puerto mach NSApplication para la comunicación entre procesos en lugar de la comunicación entre subprocesos (hilos), lo que permite a los usuarios locales ejecutar código arbitrario por medio de mensajes diseñados a aplicaciones privilegiadas. • http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://secunia.com/advisories/29420 http://www.securityfocus.com/bid/28304 http://www.securityfocus.com/bid/28340 http://www.securitytracker.com/id?1019647 http://www.us-cert.gov/cas/techalerts/TA08-079A.html http://www.vupen.com/english/advisories/2008/0924/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41314 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

Integer overflow in CoreFoundation in Apple Mac OS X 10.4.11 might allow local users to execute arbitrary code via crafted time zone data. Desbordamiento de entero de CoreFoundation en Apple Mac OS X 10.4.11, debería permitir a los usuarios locales, ejecutar código de su elección mediante datos de zona horaria manipulados. • http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://secunia.com/advisories/29420 http://www.securityfocus.com/bid/28304 http://www.securityfocus.com/bid/28375 http://www.securitytracker.com/id?1019670 http://www.us-cert.gov/cas/techalerts/TA08-079A.html http://www.vupen.com/english/advisories/2008/0924/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41310 • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The Application Firewall in Apple Mac OS X 10.5.2 has an incorrect German translation for the "Set access for specific services and applications" radio button that might cause the user to believe that the button is used to restrict access only to specific services and applications, which might allow attackers to bypass intended access restrictions. La Application Firewall en Apple Mac OS X 10.5.2 tiene una traducción al alemán incorrecta para el botón de radio "Permitir acceso para servicios y aplicaciones concretas" -Set access for specific services and applications- lo que puede provocar que el usuario crea que el botón sirve para restringir el acceso sólo a determinados servicios y aplicaciones; esto puede permitir a los atacantes evitar las restricciones de acceso pretendidas. • http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://secunia.com/advisories/29420 http://www.securityfocus.com/bid/28304 http://www.securityfocus.com/bid/28368 http://www.securitytracker.com/id?1019658 http://www.us-cert.gov/cas/techalerts/TA08-079A.html http://www.vupen.com/english/advisories/2008/0924/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41317 • CWE-264: Permissions, Privileges, and Access Controls •