Apple

macOS X

3207 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 02.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The Application Framework (AppKit) for Apple Mac OS X 10.2.8 and 10.3.6 does not properly restrict access to a secure text input field, which allows local users to read keyboard input from other applications within the same window session.

  • EPSS 0.52%
  • Published 02.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Apache for Apple Mac OS X 10.2.8 and 10.3.6 allows remote attackers to read files and resource fork content via HTTP requests to certain special file names related to multiple data streams in HFS+, which bypass Apache file handles.

  • EPSS 0.07%
  • Published 02.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Human Interface Toolbox (HIToolBox) for Apple Mac 0S X 10.3.6 allows local users to exit applications via the force-quit key combination, even when the system is running in kiosk mode.

  • EPSS 3.08%
  • Published 02.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in PSNormalizer for Apple Mac OS X 10.3.6 allows remote attackers to execute arbitrary code via a crafted PostScript input file.

  • EPSS 0.09%
  • Published 02.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Terminal for Apple Mac OS X 10.3.6 may indicate that "Secure Keyboard Entry" is enabled even when it is not, which could result in a false sense of security for the user.

  • EPSS 1.55%
  • Published 02.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Postfix server for Apple Mac OS X 10.3.6, when using CRAM-MD5, allows remote attackers to send mail without authentication by replaying authentication information.

  • EPSS 0.09%
  • Published 02.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Unknown vulnerability in Apple Mac OS X 10.3.6 server, when using Kerberos authentication and Cyrus IMAP allows local users to access mailboxes of other users.

  • EPSS 2.06%
  • Published 23.11.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.

  • EPSS 2.27%
  • Published 23.11.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.

  • EPSS 0.67%
  • Published 23.11.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a ...