[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87854

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9137 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary shell command execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary shell commands.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vector. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle certain error messages. Successful exploitation allows attackers to obtain the results of a query they did not have privileges to execute by observing the constraint violation error messages p ...

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted timestamp formatting template. Successful exploitation allows attackers to cause PostgreSQL to crash or under certain conditions, execute arbitrary code with the permissions of ...

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted string. Successful exploitation allows attackers to crash or potentially, lead to privilege escalation.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a stack-buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause PostgreSQL to crash or, potentially execute arbitrary code with the permissions of the user running PostgreSQL.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a sql injection vulnerability. A flaw is present in the application, which fails to handle certain errors that were generated during protocol synchronization. Successful exploitation allows attackers to inject queries into an existing connection.

The host is installed with macOS Server before 5.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is installed with macOS Server before 5.2 and is prone to a httpoxy vulnerability. A flaw is present in the application, which fails to handle HTTP_PROXY environment variable. Successful exploitation could allow attackers to proxy traffic through an arbitrary server.

The host is installed with macOS Server before 5.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to exploit weaknesses in the RC4 cryptographic algorithm.


Pages:      Start    902    903    904    905    906    907    908    909    910    911    912    913    ..   913

© SecPod Technologies