Page 528 of 2946 results (0.012 seconds)

CVSS: 9.0EPSS: 2%CPEs: 45EXPL: 2

Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 20050914, NetBSD 2.* and 3.* before 20061203, and Apple Mac OS X before 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a long pathname that results from path expansion. Desbordamiento de búfer en la conjunto de la implementación de libc in NetBSD-current versiones anteriores a 20050914, NetBSD 2.* y 3.* versiones anteriores a 20061203, y Apple Mac OSX anterior a 2007-004, tal y como se usan en el demonio FTP y tnftpd, permite a atacantes remotos autenticados ejecutar código de su elección mediante un nombre de ruta largo que resulta de una expansión en la ruta. • https://www.exploit-db.com/exploits/2874 https://www.exploit-db.com/exploits/29204 http://docs.info.apple.com/article.html?artnum=305391 http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-027.txt.asc http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html http://secunia.com/advisories/23178 http://secunia.com/advisories/24966 http://securitytracker.com/id?1017386 http:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.6EPSS: 0%CPEs: 18EXPL: 0

QuickTime for Java on Mac OS X 10.4 through 10.4.8, when used with Quartz Composer, allows remote attackers to obtain sensitive information (screen images) via a Java applet that accesses images that are being rendered by other embedded QuickTime objects. QuickTime para Java en Mac OS X 10.4 hasta 10.4.8, cuando es usado con Quartz Composer, permite a atacantes remotos obtener información sensible (imágenes de la pantalla) mediante un applet de Java que accede a imágenes que han sido renderizadas por otros objetos QuickTime empotrados. • http://docs.info.apple.com/article.html?artnum=304916 http://lists.apple.com/archives/Security-announce/2006/Dec/msg00000.html http://secunia.com/advisories/23438 http://securitytracker.com/id?1017402 http://www.osvdb.org/32380 http://www.securityfocus.com/bid/21672 http://www.vupen.com/english/advisories/2006/5072 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Multiple unspecified vulnerabilities in BOMArchiveHelper in Mac OS X allow user-assisted remote attackers to cause a denial of service (application crash) via unspecified vectors related to (1) certain KERN_PROTECTION_FAILURE thread crashes and (2) certain KERN_INVALID_ADDRESS thread crashes, as discovered with the "iSec Partners FileP fuzzer". Múltiples vulnerabilidades no especificadas en BOMArchiveHelper de Mac OS X permiten a atacantes remotos con la intervención del usuario provocar una denegación de servicio (caída de la aplicación) mediante vectores relacionados con ciertas caídas de hilos (1) KERN_PROTECTION_FAILURE y (2) KERN_INVALID_ADDRESS, como ha sido descubierto con el "iSec Partners FileP fuzzer". • http://security-protocols.com/2006/12/04/bomarchivehelper-needs-some-lovin http://www.securityfocus.com/bid/21446 •

CVSS: 5.7EPSS: 1%CPEs: 4EXPL: 0

Apple Airport Extreme firmware 0.1.27 in Mac OS X 10.4.8 on Mac mini, MacBook, and MacBook Pro with Core Duo hardware allows remote attackers to cause a denial of service (out-of-bounds memory access and kernel panic) and have possibly other security-related impact via certain beacon frames. Apple Airport Extreme firmware 0.1.27 en Mac OS X 10.4.8 permite a atacantes remotos provocar una denegación de servicio (acceso a memoria fuera de rango, y fallo irrecuperable del sistema o kernel panic) y también otros posibles impactos relacionados con la seguridad mediante ciertos marcos (beacon frames). • http://docs.info.apple.com/article.html?artnum=305031 http://lists.apple.com/archives/Security-announce/2007/Mar/msg00001.html http://lists.apple.com/archives/security-announce/2007/Jan/msg00001.html http://projects.info-pull.com/mokb/MOKB-30-11-2006.html http://secunia.com/advisories/23159 http://securitytracker.com/id?1017328 http://www.apple.com/support/downloads/airportextremeupdate2007001.html http://www.kb.cert.org/vuls/id/583552 http://www.securityfocus.com/bid/21383 http:&# •

CVSS: 5.1EPSS: 1%CPEs: 1EXPL: 0

Stack-based buffer overflow in the Apple Type Services (ATS) server in Mac OS 10.4.8 and earlier allow user-assisted attackers to execute arbitrary code via crafted font files. Desbordamiento de búfer basado en pila en el servidor Apple Type Services (ATS) de Mac OS 10.4.8 y anteriores permite a atacantes con la intervención del usuario ejecutar código de su elección mediante archivos de fuentes manipulados. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017301 http://www.kb.cert.org/vuls/id/835936 http://www.osvdb.org/30737 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •