[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110507

 
 

909

 
 

86504

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 8997 Download | Alert*

The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle Type 1 fonts. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle authentication authority. Successful exploitation could allow attackers to bypass the password requirement.

The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle access control issue existed in Open Directory. Successful exploitation could allow attackers to another local user's password data.

The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple vulnerabilities. The flaw are present in the application, which fails to handle disk images. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaw are present in the application, which fails to properly encode characters in html output. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle errors during processing of a nonstandard extension in a Certificate Revocation list (CRL). Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file deletions in directories with the sticky bit. Successful exploitation could allow attackers to bypass intended permissions.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an environment variable. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process eSCL packets. Successful exploitation could allow attackers to extract payload from eSCL packets sent over a secure connection.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly process an invalid file that begins with a # character and lacks a newline character. Successful exploitation could allow attackers to disclose sensitive information or crash the service.


Pages:      Start    779    780    781    782    783    784    785    786    787    788    789    790    791    792    ..   899

© SecPod Technologies