[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 85329 Download | Alert*

Microsoft Lync 2011 for Mac is installed

The host is missing a security update according to Apple advisory, APPLE-SA-2012-09-17-1. The update is required to fix a information disclosure vulnerability. A flaw is present in the application, which fails to maintain a secure connection to a 3rd party VNC server when "Encrypt all network data" is set. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to JAX-WS. Successful exploitation allows attackers to affect integrity.

The host is installed with VideoLAN VLC media player 0.5.0 before 1.0.6 and is prone to a null pointer dereference and application crash vulnerability. A flaw is present in the application, which fails to handle an empty location element in an XML Shareable Playlist Format (XSPF) document. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with VideoLAN VLC Media Player 2.2.1 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted 3GP file. Successful exploitation allows attackers to crash the service or execute arbitrary code.

The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not check for empty arguments. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is missing a critical security update according to Mozilla advisory, MFSA2011-33. A flaw is present in the applications which fails to properly handle a crafted web site. Successful exploitation allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site.

Apache CouchDB is installed on Mac OS X

The host is installed with RealNetworks RealPlayer before 12.0.0.1703 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Pidgin before 2.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to ensure that the incoming message contained all required fields. Successful exploitation could allow attackers to crash the service.


Pages:      Start    7950    7951    7952    7953    7954    7955    7956    7957    7958    7959    7960    7961    7962    7963    ..   8532

© SecPod Technologies