[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17033 Download | Alert*

The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

The host is installed with Microsoft Office 2011 for Mac and is prone to an integer underflow vulnerability. A flaw is present in the application, which decreases an integer value beyond its intended minimum value. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attac ...

The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

The host is installed with Apple Mac OS X 10.6.8 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle embedded Type 1 fonts. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 and is prone to multiple vulnerabilities. The flaw are present in the application, which fails to handle disk images. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle API in Apple Type Services (ATS). Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows local users to execute arbitrary code with kernel privileges.


Pages:      Start    1691    1692    1693    1694    1695    1696    1697    1698    1699    1700    1701    1702    1703    ..   1703

© SecPod Technologies