Page 82 of 603 results (0.010 seconds)

CVSS: 5.0EPSS: 4%CPEs: 20EXPL: 0

The SSH key generation process in OpenSSH in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote attackers to cause a denial of service by connecting to the server before SSH has finished creating keys, which causes the keys to be regenerated and can break trust relationships that were based on the original keys. El proceso de generación de clave SSH en OpenSSH de Mac OS X 10.3.9 y 10.4 hasta 10.4.8 permite a atacantes remotos provocar una denegación de servicio conectándose al servidor antes de que SSH haya finalizado la creación de claves, lo cual provoca que las claves sean regeneradas y pueden romper relaciones de confianza basadas en las claves originales. • http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://secunia.com/advisories/24479 http://www.osvdb.org/34850 http://www.securityfocus.com/bid/22948 http://www.securitytracker.com/id?1017756 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/0930 https://exchange.xforce.ibmcloud.com/vulnerabilities/32975 •

CVSS: 6.8EPSS: 5%CPEs: 20EXPL: 0

Integer overflow in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote user-assisted attackers to execute arbitrary code via a crafted AppleSingleEncoding disk image. Desbordamiento de entero en Apple Mac OS X 10.3.9 y 10.4 hasta 10.4.8 permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante una imagen de disco AppleSingleEncoding artesanal. • http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://secunia.com/advisories/24479 http://www.kb.cert.org/vuls/id/124280 http://www.osvdb.org/34847 http://www.securityfocus.com/bid/22948 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/0930 •

CVSS: 6.8EPSS: 3%CPEs: 20EXPL: 0

Unspecified vulnerability in diskimages-helper in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote user-assisted attackers to execute arbitrary code via a crafted compressed disk image that triggers memory corruption. Vulnerabilidad no especificada en diskimages-helper de Apple Mac OS X 10.3.9 y 10.4 hasta 10.4.8 permite ejecutar código de su elección mediante una imagen de disco comprimida artesanal que provoca una corrupción de memoria. • http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://secunia.com/advisories/24479 http://www.osvdb.org/34846 http://www.securityfocus.com/bid/22948 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/0930 •

CVSS: 4.4EPSS: 0%CPEs: 20EXPL: 0

Unspecified vulnerability in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 creates files insecurely while initializing a USB printer, which allows local users to create or overwrite arbitrary files. Vulnerabilidad no especificada en Apple Mac OS X 10.3.9 y 10.4 hasta 10.4.8 crea ficheros de forma insegura al inicializar una impresora USB, lo cual permite a usuarios locales crear o sobrescribir ficheros de su elección. • http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://secunia.com/advisories/24479 http://www.osvdb.org/34849 http://www.securityfocus.com/bid/22948 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/0930 https://exchange.xforce.ibmcloud.com/vulnerabilities/32976 •

CVSS: 6.8EPSS: 2%CPEs: 20EXPL: 0

Stack-based buffer overflow in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote user-assisted attackers to execute arbitrary code via an image with a crafted ColorSync profile. Desbordamiento de búfer basado en pila en Apple Mac OS X 10.3.9 y 10.4 hasta 10.4.8 permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante una imagen con un perfil ColorSync artesanal. • http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://secunia.com/advisories/24479 http://www.kb.cert.org/vuls/id/449440 http://www.osvdb.org/34845 http://www.securityfocus.com/bid/22948 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.vupen.com/english/advisories/2007/0930 •