[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196097 Download | Alert*

The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before, 5.0 Update 33 or before and 1.4.2_35 or before and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to update, insert or delete access to some Java Runti ...

postgresql-9.4: Object-relational SQL database - postgresql-9.3: Object-relational SQL database - postgresql-9.1: Object-relational SQL database PostgreSQL could be made to crash or expose private information if it handled specially crafted data.

postgresql-9.4: Object-relational SQL database - postgresql-9.3: Object-relational SQL database - postgresql-9.1: Object-relational SQL database PostgreSQL could be made to crash or run programs if it handled specially crafted data.

The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle errors during execution of certain SELECT statements with subqueries. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks. Successful exploitation could allow attackers to bypass certain privilege checks.

The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a privilege escalation vulnerability. The flaw is present in the application, which fails to perform authentication. Successful exploitation could allow attackers to gain privileges by leveraging access to (1) the server or (2) a bound directory.

The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to verify the unique identifier of its remote AFP volume or Time Capsule. Successful exploitation could allow attackers to obtain sensitive information contained in new backups by spoofing this storage object.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an Off-by-one buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted rdrf atom in a movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    8070    8071    8072    8073    8074    8075    8076    8077    8078    8079    8080    8081    8082    8083    ..   19609

© SecPod Technologies