[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194475 Download | Alert*

The host is installed with Apple Mac OS X 10.6.8 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted STYLE element in an e-mail message. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long pathname for a UNIX socket. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a replay REPORT operation. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request for a baselined WebDAV resource. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle certain flags arguments. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a multiple cross site scripting vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a click-jacking attack vulnerability. A flaw is present in the application, which fails to prevent page rendering inside a frame in a third-party HTML document. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle properly handle 8-bit characters in passwords. Successful exploitation could allow attackers to crash the service.


Pages:      Start    7565    7566    7567    7568    7569    7570    7571    7572    7573    7574    7575    7576    7577    7578    ..   19447

© SecPod Technologies