Page 56 of 455 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Integer overflow in the API for the AirPort wireless driver on Apple Mac OS X 10.4.7 might allow physically proximate attackers to cause a denial of service (crash) or execute arbitrary code in third-party wireless software that uses the API via crafted frames. Desbordamiento de enteros en la API para el controlador de AirPort Wireless sobre Apple Mac OS X 10.4.7 que permitirían a un atacante cercano fisicamente provocar denegación de serivicio(caida) o ejecutar código de su elección con un software de terceros que utiliza el API a través de marcos artesanales. • http://lists.apple.com/archives/Security-announce/2006/Sep/msg00001.html http://secunia.com/advisories/22068 http://securitytracker.com/id?1016903 http://www.kb.cert.org/vuls/id/563492 http://www.securityfocus.com/bid/20144 http://www.vupen.com/english/advisories/2006/3737 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Heap-based buffer overflow in the AirPort wireless driver on Apple Mac OS X 10.4.7 allows physically proximate attackers to cause a denial of service (crash), gain privileges, and execute arbitrary code via a crafted frame that is not properly handled during scan cache updates. Desbordamiento de búfer basado en montón en el controlador wireless AirPort en Apple Mac OS X 10.4.7 permite a atacantes físicamente próximos provocar una denegación de servicio (caída), obteniendo privilegios, y ejecutando código de su elección mediante una trama artesanal que no es manejada adecuadamente durante las actualizaciones de escaneo de cache. • http://lists.apple.com/archives/Security-announce/2006/Sep/msg00001.html http://secunia.com/advisories/22068 http://securitytracker.com/id?1016903 http://www.kb.cert.org/vuls/id/589540 http://www.securityfocus.com/bid/20144 http://www.vupen.com/english/advisories/2006/3737 •

CVSS: 4.6EPSS: 0%CPEs: 72EXPL: 1

Buffer overflow in kextload in Apple OS X, as used by TDIXSupport in Roxio Toast Titanium and possibly other products, allows local users to execute arbitrary code via a long extension argument. Desbordamiento de buffer en kextload en Apple OS X, como ha sido usado por TDIXSupport en Roxio Toast Titanium y posiblemente otros productos, permite a usuarios locales ejecutar código de su elección vía un argumento con extensión larga. • https://www.exploit-db.com/exploits/28578 http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049452.html http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt http://www.securityfocus.com/bid/20034 •

CVSS: 7.5EPSS: 7%CPEs: 9EXPL: 0

BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned. BIND anterior a 9.2.6-P1 y 9.3.x anterior a 9.3.2-P1 permite a un atacante remoto provocar denegación de servicio (caida) a través de ciertas consultas SIG, lo cual provoca una falta de aserción cuando múltiples RRsets se devuelven. • http://docs.info.apple.com/article.html?artnum=305530 http://lists.apple.com/archives/security-announce/2007/May/msg00004.html http://secunia.com/advisories/21752 http://secunia.com/advisories/21786 http://secunia.com/advisories/21816 http://secunia.com/advisories/21818 http://secunia.com/advisories/21828 http://secunia.com/advisories/21835 http://secunia.com/advisories/21838 http://secunia.com/advisories/21912 http://secunia.com/advisories/21926 http://secunia.com/advisories&#x • CWE-617: Reachable Assertion •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in the Xsan Filesystem driver on Mac OS X 10.4.7 and OS X Server 10.4.7 allows local users with Xsan write access, to execute arbitrary code via unspecified vectors related to "processing a path name." Desbordamiento de búfer en el controlador de Sistema de Ficheros Xsan en Mac OS X 10.4.7 y OS X Server 10.4.7 permite a usuarios locales con acceso de lectura Xsan, ejecutar código de su elección a través de vectores no especificados relacionados con "el procesado de un nombre de ruta". • http://docs.info.apple.com/article.html?artnum=304188 http://secunia.com/advisories/21551 http://securitytracker.com/id?1016711 http://www.kb.cert.org/vuls/id/737204 http://www.osvdb.org/27994 http://www.securityfocus.com/bid/19579 http://www.vupen.com/english/advisories/2006/3315 •