[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16033 Download | Alert*

The host is installed with Apple Mac OS X before 10.6.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate hostnames of SSH clients. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X server before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted RADIUS Access Request message. Successful exploitation could allow attackers to obtain network connectivity.

The host is installed with Apple Mac OS X server before 10.6.3 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle crafted filenames. Successful exploitation could allow attackers to read arbitrary files.

The host is installed with Apple Mac OS X and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly resolve pathnames in certain circumstances involving an application's save panel. Successful exploitation could allow attackers to trigger unintended remote file copying.

The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails ensure that copied files are owned by the user performing the copy. Successful exploitation could allow local users to bypass intended disk-quota restrictions.

The host is installed with Apple Mac OS X 10.6 before 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails properly perform access control checks. Successful exploitation could allow remote authenticated users to bypass intended access restrictions.

The host is installed with Apple Mac OS X 10.5.8 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle strings that are used as input to the sasl_encode64 function in lib/saslutil.c. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a redirect. Successful exploitation could allow attackers to access local files

The host is installed with Apple Mac OS X 10.5.8 and is prone to an improper virus update vulnerability. A flaw is present in the application if Security Update 2009-005 is applied, which has an incorrect launchd.plist ProgramArguments key and consequently does not run. Successful exploitation could allow attackers to introduce viruses into the system.


Pages:      Start    1174    1175    1176    1177    1178    1179    1180    1181    1182    1183    1184    1185    1186    1187    ..   1603

© SecPod Technologies