Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.806154
Categoría:Mac OS X Local Security Checks
Título:Apple Mac OS X Multiple Vulnerabilities-02 (Oct 2015)
Resumen:Apple Mac OS X is prone to multiple vulnerabilities.
Descripción:Summary:
Apple Mac OS X is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist. Please see the
references for more details.

Vulnerability Impact:
Successful exploitation will allow attacker
to obtain sensitive information, execute arbitrary code, bypass intended launch
restrictions and access restrictions, cause a denial of service, write to
arbitrary files, execute arbitrary code with system privilege.

Affected Software/OS:
Apple Mac OS X versions 10.6.8 through
10.11

Solution:
Upgrade to Apple Mac OS X version
10.11 or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-7761
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
BugTraq ID: 76908
http://www.securityfocus.com/bid/76908
Common Vulnerability Exposure (CVE) ID: CVE-2015-7760
http://www.securitytracker.com/id/1033703
Common Vulnerability Exposure (CVE) ID: CVE-2015-5922
http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html
BugTraq ID: 76911
http://www.securityfocus.com/bid/76911
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-5917
https://cxsecurity.com/issue/WLB-2013040082
https://www.youtube.com/watch?v=MBK4QYkUm10
Common Vulnerability Exposure (CVE) ID: CVE-2015-5915
Common Vulnerability Exposure (CVE) ID: CVE-2015-5914
https://trmm.net/Thunderstrike_FAQ
Common Vulnerability Exposure (CVE) ID: CVE-2015-5913
Common Vulnerability Exposure (CVE) ID: CVE-2015-5902
Common Vulnerability Exposure (CVE) ID: CVE-2015-5901
Common Vulnerability Exposure (CVE) ID: CVE-2015-5900
Common Vulnerability Exposure (CVE) ID: CVE-2015-5897
Common Vulnerability Exposure (CVE) ID: CVE-2015-5894
Common Vulnerability Exposure (CVE) ID: CVE-2015-5893
Common Vulnerability Exposure (CVE) ID: CVE-2015-5891
Common Vulnerability Exposure (CVE) ID: CVE-2015-5890
Common Vulnerability Exposure (CVE) ID: CVE-2015-5889
https://www.exploit-db.com/exploits/38371/
https://www.exploit-db.com/exploits/38540/
http://seclists.org/fulldisclosure/2015/Oct/5
http://packetstormsecurity.com/files/133826/issetugid-rsh-libmalloc-OS-X-Local-Root.html
http://packetstormsecurity.com/files/134087/Mac-OS-X-10.9.5-10.10.5-rsh-libmalloc-Privilege-Escalation.html
http://www.rapid7.com/db/modules/exploit/osx/local/rsh_libmalloc
Common Vulnerability Exposure (CVE) ID: CVE-2015-5888
Common Vulnerability Exposure (CVE) ID: CVE-2015-5887
Common Vulnerability Exposure (CVE) ID: CVE-2015-5884
Common Vulnerability Exposure (CVE) ID: CVE-2015-5883
Common Vulnerability Exposure (CVE) ID: CVE-2015-5878
Common Vulnerability Exposure (CVE) ID: CVE-2015-5877
Common Vulnerability Exposure (CVE) ID: CVE-2015-5875
Common Vulnerability Exposure (CVE) ID: CVE-2015-5873
Common Vulnerability Exposure (CVE) ID: CVE-2015-5872
Common Vulnerability Exposure (CVE) ID: CVE-2015-5871
Common Vulnerability Exposure (CVE) ID: CVE-2015-5870
Common Vulnerability Exposure (CVE) ID: CVE-2015-5866
Common Vulnerability Exposure (CVE) ID: CVE-2015-5865
Common Vulnerability Exposure (CVE) ID: CVE-2015-5864
Common Vulnerability Exposure (CVE) ID: CVE-2015-5854
Common Vulnerability Exposure (CVE) ID: CVE-2015-5853
Common Vulnerability Exposure (CVE) ID: CVE-2015-5849
Common Vulnerability Exposure (CVE) ID: CVE-2015-5836
Common Vulnerability Exposure (CVE) ID: CVE-2015-5833
Common Vulnerability Exposure (CVE) ID: CVE-2015-5830
Common Vulnerability Exposure (CVE) ID: CVE-2015-3785
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.