Page 519 of 2946 results (0.029 seconds)

CVSS: 7.2EPSS: 0%CPEs: 20EXPL: 0

Unspecified vulnerability in the CoreServices daemon in CarbonCore in Apple Mac OS X 10.4 through 10.4.9 allows local users to gain privileges via unspecified vectors involving "obtaining a send right to [the] Mach task port." Vulnerabilidad no especificada en el demonio CoreServices en CarbonCore en Apple Mac OS X 10.4 hasta 10.4.9 permite a usuarios locales ganar privilegios a través de vectores no especificados afectando a "la obtención del envío correcto en el puerto de la tarea Mach". • http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://secunia.com/advisories/24966 http://www.osvdb.org/34859 http://www.securityfocus.com/bid/23569 http://www.securitytracker.com/id?1017942 http://www.us-cert.gov/cas/techalerts/TA07-109A.html http://www.vupen.com/english/advisories/2007/1470 •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 0

Buffer overflow in the AirPortDriver module for AirPort in Apple Mac OS X 10.3.9 through 10.4.9, when running on hardware with the original AirPort wireless card, allows local users to execute arbitrary code by "sending malformed control commands." Desbordamiento de búfer en el módulo AirPortDriver para AirPort en Apple Mac OS X 10.3.9 hasta 10.4.9, al ejecutarse en hardware con la tarjeta wireless AirPort original, permite a usuarios locales ejecutar código de su elección "enviando comandos de control mal formados". • http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://secunia.com/advisories/24966 http://www.osvdb.org/34857 http://www.securityfocus.com/bid/23569 http://www.us-cert.gov/cas/techalerts/TA07-109A.html http://www.vupen.com/english/advisories/2007/1470 •

CVSS: 5.4EPSS: 0%CPEs: 12EXPL: 0

fsck, as used by the AirPort Disk feature of the AirPort Extreme Base Station with 802.11n before Firmware Update 7.1, and by Apple Mac OS X 10.3.9 through 10.4.9, does not properly enforce password protection of a USB hard drive, which allows context-dependent attackers to list arbitrary directories or execute arbitrary code, resulting from memory corruption. fsck, tal y como es usada por la funcionalidad AirPort Disk de la AirPort Extreme Base Station con 802.11n anteriores a Firmware Update 7.1, y por Apple Mac OS X versiones 10.3.9 hasta 10.4.9, no aplica correctamente la protección de contraseña de un disco duro USB, lo que permite a atacantes dependiendo del contexto enumerar directorios arbitrarios o ejecutar código arbitrario, como resultado de una corrupción de memoria. • http://docs.info.apple.com/article.html?artnum=305366 http://docs.info.apple.com/article.html?artnum=305391 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://lists.apple.com/archives/security-announce/2007/Apr/msg00000.html http://secunia.com/advisories/24830 http://secunia.com/advisories/24966 http://www.securityfocus.com/bid/23396 http://www.securityfocus.com/bid/23569 http://www.securitytracker.com/id?1017889 http://www.securitytracker.com/id?101794 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.4EPSS: 0%CPEs: 20EXPL: 0

Unspecified vulnerability in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 creates files insecurely while initializing a USB printer, which allows local users to create or overwrite arbitrary files. Vulnerabilidad no especificada en Apple Mac OS X 10.3.9 y 10.4 hasta 10.4.8 crea ficheros de forma insegura al inicializar una impresora USB, lo cual permite a usuarios locales crear o sobrescribir ficheros de su elección. • http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://secunia.com/advisories/24479 http://www.osvdb.org/34849 http://www.securityfocus.com/bid/22948 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/0930 https://exchange.xforce.ibmcloud.com/vulnerabilities/32976 •

CVSS: 5.0EPSS: 4%CPEs: 20EXPL: 0

The SSH key generation process in OpenSSH in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote attackers to cause a denial of service by connecting to the server before SSH has finished creating keys, which causes the keys to be regenerated and can break trust relationships that were based on the original keys. El proceso de generación de clave SSH en OpenSSH de Mac OS X 10.3.9 y 10.4 hasta 10.4.8 permite a atacantes remotos provocar una denegación de servicio conectándose al servidor antes de que SSH haya finalizado la creación de claves, lo cual provoca que las claves sean regeneradas y pueden romper relaciones de confianza basadas en las claves originales. • http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://secunia.com/advisories/24479 http://www.osvdb.org/34850 http://www.securityfocus.com/bid/22948 http://www.securitytracker.com/id?1017756 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/0930 https://exchange.xforce.ibmcloud.com/vulnerabilities/32975 •