Page 505 of 2650 results (0.009 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

Directory traversal vulnerability in the Bluetooth file and object exchange (OBEX) services in Mac OS X 10.3.9 allows remote attackers to read arbitrary files. • https://www.exploit-db.com/exploits/25598 http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://www.digitalmunition.com/DMA%5B2005-0502a%5D.txt http://www.securityfocus.com/bid/13491 •

CVSS: 3.6EPSS: 0%CPEs: 56EXPL: 1

Mac OS X 10.3.x and earlier uses insecure permissions for a pseudo terminal tty (pty) that is managed by a non-setuid program, which allows local users to read or modify sessions of other users. • http://www.security-focus.com/archive/1/397306 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Stack-based buffer overflow in the VPN daemon (vpnd) for Mac OS X before 10.3.9 allows local users to execute arbitrary code via a long -i (Server_id) argument. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://www.kb.cert.org/vuls/id/706838 http://www.us-cert.gov/cas/techalerts/TA05-136A.html •

CVSS: 2.1EPSS: 0%CPEs: 16EXPL: 2

Integer signedness error in the parse_machfile function in the mach-o loader (mach_loader.c) for the Darwin Kernel as used in Mac OS X 10.3.7, and other versions before 10.3.9, allows local users to cause a denial of service (CPU consumption) via a crafted mach-o header. • http://felinemenace.org/advisories/macosx.txt http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html http://marc.info/?l=bugtraq&m=110616533903671&w=2 http://secunia.com/advisories/13902 http://securitytracker.com/id?1012941 http://securitytracker.com/id?1013735 http://www.ciac.org/ciac/bulletins/p-185.shtml http://www.securityfocus.com/bid/12314 http://www.vupen.com/english/advisories/2005/0041 https://exchange.xforce.ibmcloud.com/vulnerabilities/18979 •

CVSS: 7.6EPSS: 0%CPEs: 30EXPL: 0

Mac OS X 10.3.9 and earlier allows users to install, create, and execute setuid/setgid scripts, contrary to the intended design, which may allow attackers to conduct unauthorized activities with escalated privileges via vulnerable scripts. • http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html • CWE-264: Permissions, Privileges, and Access Controls •