Total vulnerabilities in the database
DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.
Software | From | Fixed in |
---|---|---|
apple / mac_os_x_server | 10.2.2 | 10.2.2.x |
apple / mac_os_x | 10.0.2 | 10.0.2.x |
apple / mac_os_x_server | 10.2.4 | 10.2.4.x |
apple / mac_os_x | 10.2.1 | 10.2.1.x |
apple / mac_os_x | 10.1 | 10.1.x |
apple / mac_os_x | 10.0.1 | 10.0.1.x |
apple / mac_os_x_server | 10.2.3 | 10.2.3.x |
apple / mac_os_x | 10.0.3 | 10.0.3.x |
apple / mac_os_x | 10.1.4 | 10.1.4.x |
apple / mac_os_x | 10.0.4 | 10.0.4.x |
apple / mac_os_x | 10.2 | 10.2.x |
apple / mac_os_x | 10.2.2 | 10.2.2.x |
apple / mac_os_x_server | 10.2.1 | 10.2.1.x |
apple / mac_os_x | 10.1.1 | 10.1.1.x |
apple / mac_os_x | 10.1.2 | 10.1.2.x |
apple / mac_os_x | 10.1.3 | 10.1.3.x |
apple / mac_os_x | 10.0 | 10.0.x |
apple / mac_os_x | 10.2.3 | 10.2.3.x |
apple / mac_os_x | 10.2.4 | 10.2.4.x |
apple / mac_os_x_server | 10.0 | 10.0.x |
apple / mac_os_x_server | 10.2 | 10.2.x |
apple / mac_os_x | 10.1.5 | 10.1.5.x |