[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194475 Download | Alert*

The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a privilege escalation vulnerability. The flaw is present in the application, which fails to perform authentication. Successful exploitation could allow attackers to gain privileges by leveraging access to (1) the server or (2) a bound directory.

The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to verify the unique identifier of its remote AFP volume or Time Capsule. Successful exploitation could allow attackers to obtain sensitive information contained in new backups by spoofing this storage object.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an Off-by-one buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted rdrf atom in a movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly perform OpenGL Shading Language (aka GLSL) compilation. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an integer overflow vulnerability. The flaw is present in the application, which fails to properly handle crafted DNS data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to preserve the Wi-Fi configuration across software updates. Successful exploitation could allow attackers to obtain sensitive information by leveraging the lack of a WEP password for a Wi-Fi network.

The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly restrict the allocation of stack memory. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple Mac OS X 10.7.x before 10.7.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted embedded font in a document. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    7562    7563    7564    7565    7566    7567    7568    7569    7570    7571    7572    7573    7574    7575    ..   19447

© SecPod Technologies