Page 58 of 444 results (0.010 seconds)

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

The TIFFFetchAnyArray function in ImageIO in Apple OS X 10.4.7 and earlier allows remote user-assisted attackers to cause a denial of service (application crash) via an invalid tag value in a TIFF image, possibly triggering a null dereference. NOTE: This is a different issue than CVE-2006-1469. La función TIFFFetchAnyArray en ImageIO de Apple OS X 10.4.7 y versiones anteriores permiten al atacantes con la intervención del usuario causar una denegación de servicios (caída de la aplicación)a través de un valor de etiqueta inválido en una imagen TIFF, posiblemente lanzando una referencia nula. NOTA: Asunto diferente a CVE-2006-1469. • http://www.security-protocols.com/sp-x31-advisory.php http://www.vupen.com/english/advisories/2006/2606 https://exchange.xforce.ibmcloud.com/vulnerabilities/27482 •

CVSS: 7.5EPSS: 1%CPEs: 14EXPL: 0

Stack-based buffer overflow in ImageIO in Apple Mac OS X 10.4 up to 10.4.6 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image. Desbordamiento de búfer basado en pila en ImageIO de Apple Mac OS X v10.4 hasta la v10.4.6 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código de su elección a través de una imagen TIFF modificada. • http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html http://secunia.com/advisories/20877 http://securitytracker.com/id?1016394 http://www.kb.cert.org/vuls/id/988356 http://www.osvdb.org/26931 http://www.securityfocus.com/bid/18686 http://www.securityfocus.com/bid/18731 http://www.vupen.com/english/advisories/2006/2566 https://exchange.xforce.ibmcloud.com/vulnerabilities/27478 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 10%CPEs: 14EXPL: 3

OpenLDAP in Apple Mac OS X 10.4 up to 10.4.6 allows remote attackers to cause a denial of service (crash) via an invalid LDAP request that triggers an assert error. OpenLDAP en Apple Mac OS X v10.4 up a v10.4.6 permite a atacantes remotos causar una denegación de servicio (caída) a través de una petición LDAP no válida que lanza un error assert. • https://www.exploit-db.com/exploits/28135 http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html http://secunia.com/advisories/20877 http://securitytracker.com/id?1016396 http://www.kb.cert.org/vuls/id/652196 http://www.osvdb.org/26932 http://www.securityfocus.com/bid/18686 http://www.securityfocus.com/bid/18728 http://www.vupen.com/english/advisories/2006/2566 https://exchange.xforce.ibmcloud.com/vulnerabilities/27480 • CWE-399: Resource Management Errors •

CVSS: 4.6EPSS: 2%CPEs: 14EXPL: 0

Format string vulnerability in the CF_syslog function launchd in Apple Mac OS X 10.4 up to 10.4.6 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a syslog call in the logging facility, as demonstrated by using a crafted plist file. Vulnerabilidad de formato de cadena en la función CF_syslog launchd en Apple Mac OS X v10.4 hasta v10.4.6 permite a usuarios locales ejecutar código de su elección a través de especificadores de formato de cadena que no son manejados adecuadamente en una llamada syslog en la facilidad logging, como quedó demostrado usando un fichero plist manipulado. • http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html http://secunia.com/advisories/20877 http://securitytracker.com/id?1016397 http://www.osvdb.org/26933 http://www.securityfocus.com/archive/1/438699/100/0/threaded http://www.securityfocus.com/bid/18686 http://www.securityfocus.com/bid/18724 http://www.vupen.com/english/advisories/2006/2566 https://exchange.xforce.ibmcloud.com/vulnerabilities/27479 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.5EPSS: 9%CPEs: 4EXPL: 0

Buffer overflow in QuickTime Streaming Server in Apple Mac OS X 10.3.9 and 10.4.6 allows remote attackers to execute arbitrary code via a crafted RTSP request, which is not properly handled during message logging. • http://lists.apple.com/archives/security-announce/2006/May/msg00003.html http://secunia.com/advisories/20077 http://securitytracker.com/id?1016070 http://www.osvdb.org/25600 http://www.securityfocus.com/bid/17951 http://www.us-cert.gov/cas/techalerts/TA06-132A.html http://www.vupen.com/english/advisories/2006/1779 https://exchange.xforce.ibmcloud.com/vulnerabilities/26424 •