[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

84051

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 8686 Download | Alert*

The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML value. Successful exploitation allows remote authenticated users to determine the existence of arbitrary files or URLs.

The host is installed with Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle dialback result messages. Successful exploitation could allow an attacker to disclose information intended for users of federated servers.

The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted TIFF images. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle rnet boxes in MP4 files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X or Apple Mac OS X Server 10.6.8, 10.7 through 10.7.5, or 10.8 before 10.8.3 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle an empty string. Successful exploitation could allow attackers to bypass certificate-based Apple ID authentication.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted embedded font in a document. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long name of an embedded font in a document. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly signal error conditions. Successful exploitation could allow remote attackers to determine the existence of an AFP share with a given name.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to prevent creation of file that are outside the bounds of a share. Successful exploitation could allow remote attackers to determine the existence of an AFP share with a given name.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.x before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted reconnect authentication packets. Successful exploitation could allow remote attackers to crash the service


Pages:      Start    782    783    784    785    786    787    788    789    790    791    792    793    794    795    ..   868

© 2013 SecPod Technologies