[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with IBM OpenAdmin Tool (OAT) before 2.72 for Informix and is prone to multiple cross site scripting vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with Apple Mac OS X before 10.6.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly validate non-printing ASCII characters. Successful exploitation could allow remote attackers to inject arbitrary web script or HTML.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle maliciously crafted embedded font. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

The host is installed with Microsoft Office 2011 for Mac and is prone to an integer underflow vulnerability. A flaw is present in the application, which decreases an integer value beyond its intended minimum value. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attac ...

The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

The host is installed with Apple Mac OS X 10.6.8 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle embedded Type 1 fonts. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple vulnerabilities. The flaw are present in the application, which fails to handle disk images. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle API in Apple Type Services (ATS). Successful exploitation could allow attackers to crash the service.


Pages:      Start    815    816    817    818    819    820    821    822    823    824    825    826    827    ..   827

© SecPod Technologies