[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9284 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted timestamp formatting template. Successful exploitation allows attackers to cause PostgreSQL to crash or under certain conditions, execute arbitrary code with the permissions of ...

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted string. Successful exploitation allows attackers to crash or potentially, lead to privilege escalation.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a stack-buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause PostgreSQL to crash or, potentially execute arbitrary code with the permissions of the user running PostgreSQL.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a sql injection vulnerability. A flaw is present in the application, which fails to handle certain errors that were generated during protocol synchronization. Successful exploitation allows attackers to inject queries into an existing connection.

The host is installed with macOS Server before 5.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is installed with macOS Server before 5.2 and is prone to a httpoxy vulnerability. A flaw is present in the application, which fails to handle HTTP_PROXY environment variable. Successful exploitation could allow attackers to proxy traffic through an arbitrary server.

The host is installed with macOS Server before 5.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to exploit weaknesses in the RC4 cryptographic algorithm.

The host is installed with Apple Pages before 6.1, Apple Numbers before 4.1 or Apple Keynote before 7.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the contents of password-protected PDFs exported from iWork. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Adobe Digital Editions before 4.5.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow remote attackers to execute code.

The host is installed with Adobe Digital Editions before 4.5.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow remote attackers to execute code.


Pages:      Start    917    918    919    920    921    922    923    924    925    926    927    928    ..   928

© SecPod Technologies