[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Puppet 2.6.x before 2.6.15 or 2.7.x before 2.7.13 and is prone to symlink attack. A flaw is present in the application, which fails to handle insecure creation of temporary files. Successful exploitation allows attackers to overwrite arbitrary files or install arbitrary packages.

The host is installed with Microsoft Silverlight and is prone to a truetype font parsing vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle when hint was set in Disk Utility while creating an APFS encrypted volume, the password will be stored as the hint. Successful exploitation could allow attackers to gain access to an encrypted APFS volume.

The host is installed with Apple Mac OS X or Server 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a malicious application. Successful exploitation could allow attackers to bypass the keychain access prompt with a synthetic click.

The host is installed with Apple Mac OS X or Server 10.12 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle proxy credentials. Successful exploitation may be able to leak sensitive user information.

The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted JPEG file. Successful exploitation may lead to arbitrary code execution.

The host is installed with Apple Mac OS X or Server 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to arbitrary code execution.

The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to execute arbitrary code with root privileges.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local user to execute arbitrary code with root privileges.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.


Pages:      Start    811    812    813    814    815    816    817    818    819    820    821    822    823    824    ..   827

© SecPod Technologies