Vulnerabilities > Apple > MAC OS X > 10.3.5

DATE CVE VULNERABILITY TITLE RISK
2004-12-02 CVE-2004-1084 Remote And Local vulnerability in Apple Mac OS X
Apache for Apple Mac OS X 10.2.8 and 10.3.6 allows remote attackers to read files and resource fork content via HTTP requests to certain special file names related to multiple data streams in HFS+, which bypass Apache file handles.
network
low complexity
apple
5.0
2004-12-02 CVE-2004-1081 Remote And Local vulnerability in Apple Mac OS X
The Application Framework (AppKit) for Apple Mac OS X 10.2.8 and 10.3.6 does not properly restrict access to a secure text input field, which allows local users to read keyboard input from other applications within the same window session.
local
low complexity
apple
2.1
2004-10-07 CVE-2005-0373 Remote And Local vulnerability in Cyrus SASL
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
network
low complexity
cyrus openpkg suse conectiva apple redhat
7.5
2004-09-07 CVE-2004-0823 OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
network
low complexity
openldap apple
7.5
2004-09-07 CVE-2004-0822 Environment Variable Buffer Overflow vulnerability in Apple CoreFoundation
Buffer overflow in The Core Foundation framework (CoreFoundation.framework) in Mac OS X 10.2.8, 10.3.4, and 10.3.5 allows local users to execute arbitrary code via a certain environment variable.
local
low complexity
apple
7.2
2002-12-18 CVE-2002-1347 Incorrect Calculation of Buffer Size vulnerability in multiple products
Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string.
network
low complexity
cyrusimap apple CWE-131
critical
9.8