[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254202

 
 

909

 
 

198060

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17494 Download | Alert*

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle FLC encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an integer signedness error vulnerability. A flaw is present in the application, which fails to properly handle a crafted font table in a QuickTime movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which returns the value of the salt argument instead of the hashed string. Successful exploitation could allow attackers to bypass authentication via an arbitrary password.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly check the return values of the malloc, calloc, and realloc library functions. Successful exploitation could allow attackers to overflow the buffer or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly check web script or HTML injected to the the _mbox parameter. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which incorrectly creates log entries containing passwords upon encountering errors in JMX user creation. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly restrict filenames in multipart/form-data POST requests. Successful exploitation could allow attackers to conduct absolute path traversal attacks.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which unconditionally performs credential delegation. Successful exploitation could allow attackers to impersonate clients via GSSAPI requests.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted STYLE element in an e-mail message. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long pathname for a UNIX socket. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    766    767    768    769    770    771    772    773    774    775    776    777    778    779    ..   1749

© SecPod Technologies