[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15859 Download | Alert*

The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted may cause arbitrary files to be removed with the privileges of the perl process

The host is installed with Apple Remote Desktop 3.5.2 or 3.6.0 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to recognize the "Encrypt all network data" setting during connections to third-party VNC servers. Successful exploitation allows remote attackers to obtain cleartext VNC session content by sniffing the network.

The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to downgrade the TLS session security and potentially recover keys.

The host is installed with Apple Mac OS X before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple Remote Desktop 3.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to maintain a secure connection to a 3rd party VNC server when "Encrypt all network data" is set. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the combination of signed negative responses and corresponding RRSIG records in the cache. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to determine the security status of an NS RRset during a DNSKEY algorithm rollover. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.4.11 or 10.5.8 and is prone to a denial of service vulnerability. A flaw is present in the dns_db_findrdataset function in db.c, which fails to handle maliciously crafted update message. Successful exploitation could allow attackers to crash the service.

The host is installed with Opera before 11.0 and is prone to an unspecified vulnerability. A flaw is present in the application. Specific details regarding the vulnerability have not been made public. Successful exploitation could allow an attacker to produce unknown impacts.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle vectors involving symbolic links. Successful exploitation could allows remote authenticated users to access arbitrary files.


Pages:      Start    1556    1557    1558    1559    1560    1561    1562    1563    1564    1565    1566    1567    1568    1569    ..   1585

© SecPod Technologies