Page 74 of 455 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

LaunchServices in Apple Mac OS X 10.4.x up to 10.4.1 does not properly mark file extensions and MIME types as unsafe if an Apple Uniform Type Identifier (UTI) is not created when the type is added to the database of unsafe types, which could allow attackers to bypass intended restrictions. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://securitytracker.com/id?1014141 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 1

launchd 106 in Apple Mac OS X 10.4.x up to 10.4.1 allows local users to overwrite arbitrary files via a symlink attack on the socket file in an insecure temporary directory. • https://www.exploit-db.com/exploits/1043 http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://marc.info/?l=bugtraq&m=111833509424379&w=2 http://www.suresec.org/advisories/adv3.pdf •

CVSS: 7.2EPSS: 0%CPEs: 54EXPL: 0

Integer overflow in the searchfs system call in Mac OS X 10.3.9 and earlier allows local users to execute arbitrary code via crafted parameters. • http://lists.apple.com/archives/security-announce/2005/Apr/msg00000.html http://www.kb.cert.org/vuls/id/185702 •

CVSS: 5.1EPSS: 1%CPEs: 21EXPL: 1

The AppleScript Editor in Mac OS X 10.3.9 does not properly display script code for an applescript: URI, which can result in code that is different than the actual code that would be run, which could allow remote attackers to trick users into executing malicious code via certain URI characters such as NULL, control characters, and homographs. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://remahl.se/david/vuln/010 http://secunia.com/advisories/15227 http://www.securityfocus.com/bid/13480 http://www.vupen.com/english/advisories/2005/0455 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the Netinfo Setup Tool (NeST) allows local users to execute arbitrary code. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html http://www.kb.cert.org/vuls/id/354486 http://www.us-cert.gov/cas/techalerts/TA05-136A.html •