[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195010 Download | Alert*

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues.

The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues.

The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues.

The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues.

Maksymilian Arciemowicz discovered a buffer overflow in the internal string routines of the KDE core libraries, which could lead to the execution of arbitrary code. For the stable distribution , this problem has been fixed in version 4:3.5.10.dfsg.1-0lenny4. For the unstable distribution , this problem has been fixed in version 4:3.5.10.dfsg.1-3. We recommend that you upgrade your kdelibs packages ...

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in OpenLDAP. Successful exploitation allows an attacker to encounter multiple issues.

The file type identification tool, file, and its associated library, libmagic, do not properly process malformed files in the Composite Document File format, leading to crashes. Note that after this update, file may return different detection results for CDF files . The new detections are believed to be more accurate.

A regression was discovered in the security update for file, which lead to false positives on the CDF format. This update fixes that regression. For reference the original advisory text follows. The file type identification tool, file, and its associated library, libmagic, do not properly process malformed files in the Composite Document File format, leading to crashes. Note that after this updat ...


Pages:      Start    7557    7558    7559    7560    7561    7562    7563    7564    7565    7566    7567    7568    7569    7570    ..   19500

© SecPod Technologies