[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195010 Download | Alert*

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted tar archive. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an uninitialized memory access vulnerability. A flaw is present in the application, which fails to properly handle X.509 certificates. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a network sniffing attack vulnerability. A flaw is present in the application, which fails to properly restrict the length of RSA keys within X.509 certificates. Successful exploitation could allow attackers to defeat cryptographic protection mechanisms by conducting a spoofing or network-sniffing attack durin ...

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML file. Successful exploitation could allow attackers to trigger a heap-based buffer overflow when adding a new namespace node.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle an empty password. Successful exploitation allows physically proximate attackers to login to arbitrary accounts.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle screen savers. Successful exploitation could allow attackers to bypass screen locking and launch a Safari process.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted audio sample tables in a movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MPEG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MPEG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.4 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with JPEG2000 encoding. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    9059    9060    9061    9062    9063    9064    9065    9066    9067    9068    9069    9070    9071    9072    ..   19500

© SecPod Technologies