CVE-2004-0923
https://notcve.org/view.php?id=CVE-2004-0923
CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local users to obtain user names and passwords. • http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html http://www.ciac.org/ciac/bulletins/p-002.shtml http://www.debian.org/security/2004/dsa-566 http://www.kb.cert.org/vuls/id/557062 http://www.mandriva.com/security/advisories?name=MDKSA-2004:116 http://www.redhat.com/support/errata/RHSA-2004-543.html http://www.securityfocus.com/bid/11324 https://exchange.xforce.ibmcloud.com/vulnerabilities/17593 https://oval.cisecurity.org/repository/search/definition/ov •
CVE-2005-0373
https://notcve.org/view.php?id=CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. • http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.linuxcompatible.org/print42495.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html http://www.securityfocus.com/bid/11347 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type •
CVE-2004-0821
https://notcve.org/view.php?id=CVE-2004-0821
The CFPlugIn in Core Foundation framework in Mac OS X allows user supplied libraries to be loaded, which could allow local users to gain privileges. • http://secunia.com/advisories/12491 http://www.auscert.org.au/render.html?it=4363 http://www.ciac.org/ciac/bulletins/o-212.shtml http://www.kb.cert.org/vuls/id/704110 http://www.securityfocus.com/bid/11135 https://exchange.xforce.ibmcloud.com/vulnerabilities/17291 •
CVE-2004-0823
https://notcve.org/view.php?id=CVE-2004-0823
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. • http://secunia.com/advisories/12491 http://secunia.com/advisories/17233 http://secunia.com/advisories/21520 http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm http://www.auscert.org.au/render.html?it=4363 http://www.redhat.com/support/errata/RHSA-2005-751.html http://www.securityfocus.com/advisories/7148 http://www.securityfocus.com/bid/11137 https://exchange.xforce.ibmcloud.com/vulnerabilities/17300 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre •
CVE-2004-0822
https://notcve.org/view.php?id=CVE-2004-0822
Buffer overflow in The Core Foundation framework (CoreFoundation.framework) in Mac OS X 10.2.8, 10.3.4, and 10.3.5 allows local users to execute arbitrary code via a certain environment variable. • http://secunia.com/advisories/12491 http://www.ciac.org/ciac/bulletins/o-212.shtml http://www.kb.cert.org/vuls/id/545446 http://www.securityfocus.com/advisories/7148 http://www.securityfocus.com/bid/11136 https://exchange.xforce.ibmcloud.com/vulnerabilities/17295 •