[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194475 Download | Alert*

The host is installed with Apple Mac OS X 10.6.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a modified POP3 port number. Successful exploitation could allow remote authenticated users to bypass firewall restrictions.

The host is installed with PHP 5.3.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which performs strndup operations on untrusted string data. Successful exploitation could allow remote attackers to crash the service.

The host is installed with PHP 5.3.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted input to an application that attempts to perform Tidy::diagnose operations on invalid objects. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to produce unknown impacts.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Scripting. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a system clock and sudo user timestamp with epoch. Successful exploitation allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by ...

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Successful exploitation allows local users with sudo permissions to hijack the authorization of another ter ...

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Successful exploitation allows local users with sudo permissions to hijack the authorization of another ter ...

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Successful exploitation allows local users with sudo permissions to hijack the authorization of another ter ...

The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which is caused due to an error in ERF file parser when processing certain malformed file. Successful exploitation allows remote attackers to cause an application crash.


Pages:      Start    7566    7567    7568    7569    7570    7571    7572    7573    7574    7575    7576    7577    7578    7579    ..   19447

© SecPod Technologies