{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T12:04:50.990","vulnerabilities":[{"cve":{"id":"CVE-2006-4395","sourceIdentifier":"cve@mitre.org","published":"2006-10-03T04:02:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in QuickDraw Manager in Apple Mac OS X 10.3.9 and 10.4 through 10.4.7 allows context-dependent attackers to cause a denial of service (\"memory corruption\" and crash) via a crafted PICT image that is not properly handled by a certain \"unsupported QuickDraw operation.\""},{"lang":"es","value":"Vulnerabilidad no especificada en Quickdraw Manager en Apple Mac OS X 10.3.9 y 10.4 hasta 10.4.7 permite a atacantes (locales o remotos dependiendo del contexto) provocar una denegación de servicio (\"corrupción de memoria\" y caída) mediante una imagen PICT creada artesanalmente que no es manejada adecuadamente por una determinada \"operación QuickDraw no soportada\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*","matchCriteriaId":"DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*","matchCriteriaId":"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*","matchCriteriaId":"AFD4DE58-46C7-4E69-BF36-C5FD768B8248"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*","matchCriteriaId":"CF824694-52DE-44E3-ACAD-60B2A84CD3CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*","matchCriteriaId":"B73A0891-A37A-4E0D-AA73-B18BFD6B1447"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*","matchCriteriaId":"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*","matchCriteriaId":"0C580935-0091-4163-B747-750FB7686973"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*","matchCriteriaId":"BB0F2132-8431-4CEF-9A3D-A69425E3834E"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*","matchCriteriaId":"8719F3C4-F1DE-49B5-9301-22414A2B6F9C"}]}]}],"references":[{"url":"http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/22187","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://securitytracker.com/id?1016956","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.kb.cert.org/vuls/id/346396","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/29274","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/20271","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA06-275A.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2006/3852","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29299","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://secunia.com/advisories/22187","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://securitytracker.com/id?1016956","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.kb.cert.org/vuls/id/346396","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/29274","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/20271","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA06-275A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.vupen.com/english/advisories/2006/3852","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29299","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}