[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

88036

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 87901 Download | Alert*

The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly interpret character encoding. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6 before 10.6.4 and is prone to a integer overflow vulnerability. A flaw is present in the application, which fails to handle vectors related to page sizes. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle vectors involving symbolic links. Successful exploitation could allows remote authenticated users to access arbitrary files.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted Wiki content. Successful exploitation allows remote attackers to inject arbitrary web script or HTML .

The host is missing a security update according to Apple advisory, APPLE-SA-2010-06-15-1 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle malicious data. Successful exploitation allows remote attackers to crash the service, execute arbitrary or inject arbitrary web script or HTML .

The host is installed with Apple Safari before 4.1 or 5.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly perform ordered list insertions. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.x before 10.6.5 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle an arbitrary certificate issued by a legitimate Certification Authority. Successful exploitation could allow remote attackers to bypass X.509 certificate authentication.

It was discovered that Cacti, a frontend to rrdtool for monitoring systems and services missed input sanitising, making an SQL injection attack possible. For the stable distribution , this problem has been fixed in version 0.8.7b-2.1+lenny2. For the unstable distribution , this problem will be fixed soon. We recommend that you upgrade your cacti package.

It was discovered that the Linux kernel did not correctly handle memory protection of the Virtual Dynamic Shared Object page when running a 32-bit application on a 64-bit kernel. A local attacker could exploit this to cause a denial of service. It was discovered that the r8169 network driver did not correctly check the size of Ethernet frames. A remote attacker could send specially crafted traff ...

USN-947-1 fixed vulnerabilities in the Linux kernel. Fixes for CVE-2010-0419 caused failures when using KVM in certain situations. This update reverts that fix until a better solution can be found. We apologize for the inconvenience. Original advisory details: It was discovered that the Linux kernel did not correctly handle memory protection of the Virtual Dynamic Shared Object page when running a ...


Pages:      Start    7763    7764    7765    7766    7767    7768    7769    7770    7771    7772    7773    7774    7775    7776    ..   8790

© SecPod Technologies