[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194475 Download | Alert*

The host is installed with Apple Mac OS X 10.6.8 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle maliciously crafted audio content. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a memory corruption vulnerability. The flaw is present in the application, which fails to properly handle crafted JPEG2000 image file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle FLC encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an integer signedness error vulnerability. A flaw is present in the application, which fails to properly handle a crafted font table in a QuickTime movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which returns the value of the salt argument instead of the hashed string. Successful exploitation could allow attackers to bypass authentication via an arbitrary password.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly check the return values of the malloc, calloc, and realloc library functions. Successful exploitation could allow attackers to overflow the buffer or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly check web script or HTML injected to the the _mbox parameter. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which incorrectly creates log entries containing passwords upon encountering errors in JMX user creation. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly restrict filenames in multipart/form-data POST requests. Successful exploitation could allow attackers to conduct absolute path traversal attacks.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which unconditionally performs credential delegation. Successful exploitation could allow attackers to impersonate clients via GSSAPI requests.


Pages:      Start    7564    7565    7566    7567    7568    7569    7570    7571    7572    7573    7574    7575    7576    7577    ..   19447

© SecPod Technologies