Page 584 of 2946 results (0.033 seconds)

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 1

DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program. DirectoryServices en MacOS X se fia de la variable de entorno PATH para localizar y ejecutar el comando touch, lo que permite a usurarios locales ejecutar comandos arbitrarios modificando PATH para que apunte a un directorio que contenga un programa 'touch' malicioso. • https://www.exploit-db.com/exploits/15 http://lists.apple.com/mhonarc/security-announce/msg00028.html http://www.atstake.com/research/advisories/2003/a041003-1.txt •

CVSS: 10.0EPSS: 97%CPEs: 81EXPL: 14

Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. Desbordamiento de búfer en la función call_trans2open en trans2.c de Samba 2.2.x anteriores a 2.2.8a, 2.0.10 y versiones anteriores 2.0.x, y Samba-TNG anteriores a de 0.3.2, permite a atacantes remotos ejecutar código arbitrario. • https://www.exploit-db.com/exploits/16880 https://www.exploit-db.com/exploits/55 https://www.exploit-db.com/exploits/7 https://www.exploit-db.com/exploits/16861 https://www.exploit-db.com/exploits/10 https://www.exploit-db.com/exploits/16876 https://www.exploit-db.com/exploits/9924 https://www.exploit-db.com/exploits/16330 https://www.exploit-db.com/exploits/22469 https://www.exploit-db.com/exploits/22471 https://www.exploit-db.com/exploits/22470 https: •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

TruBlueEnvironment for MacOS 10.2.3 and earlier allows local users to overwrite or create arbitrary files and gain root privileges by setting a certain environment variable that is used to write debugging information. TruBlueEnvironment para MacOS 10.2.3 y anteriores permite a usuarios locales sobreescribir o crear ficheros arbitrarios y ganar privilegios de root estableciendo cierta variable de entorno que es usada para establecer información de depuración. • http://docs.info.apple.com/article.html?artnum=61798 http://lists.apple.com/archives/security-announce/2003/Feb/25/applesa20030225macosx102.txt http://www.atstake.com/research/advisories/2003/a021403-1.txt http://www.iss.net/security_center/static/11332.php http://www.securityfocus.com/bid/6859 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

Apple File Protocol (AFP) in Mac OS X before 10.2.4 allows administrators to log in as other users by using the administrator password. AFP en Mac OS X anterior a 10.2.4 permite a administradores iniciar sesión como otros usuarios usando la contraseña de administrador. • http://docs.info.apple.com/article.html?artnum=61798 http://lists.apple.com/archives/security-announce/2003/Feb/25/applesa20030225macosx102.txt http://securitytracker.com/id?1006107 http://www.iss.net/security_center/static/11333.php http://www.securityfocus.com/bid/6860 •

CVSS: 7.2EPSS: 4%CPEs: 2EXPL: 2

Terminal 1.3 in Apple Mac OS X 10.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a telnet:// link, which is executed by Terminal.app window. • https://www.exploit-db.com/exploits/21815 http://apple.slashdot.org/apple/02/09/21/122236.shtml?tid=172 http://lists.apple.com/archives/security-announce/2002/Sep/msg00001.html http://www.iss.net/security_center/static/10156.php http://www.securityfocus.com/bid/5768 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •