[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 88593 Download | Alert*

The host is installed with Apple Mac OS X 10.5.8 or 10.6.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly perform comparisons to domain-name strings in X.509 certificates. Successful exploitation could allow man-in-the-middle attackers to spoof SSL servers.

The host is installed with Apple iTunes before 9.2.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which failed to handle a crafted itpc: URL. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing an important security update according to apple advisory, APPLE-SA-2010-07-19-1. the update is required to fix buffer overflow vulnerability. A flaw is present in the application, which fails to handle itpc:. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2010-07-19-1. The update is required to fix a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted itpc. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 4.1 or 5.0 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the Cascading Style Sheets (CSS) run-in property and multiple invocations of a destructor for a child element that has been referenced multiple times. Successful exploitation could allow attackers to execute arbitr ...

The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a memory management issue. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted RAW image. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PSD image. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Apple Mac OS X 10.6 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted image. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.2 before 10.6.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted image. Successful exploitation could allow remote attackers to crash the service.


Pages:      Start    7885    7886    7887    7888    7889    7890    7891    7892    7893    7894    7895    7896    7897    7898    ..   8859

© SecPod Technologies