[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16289 Download | Alert*

The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the sessions protected by SSL. Successful exploitation allows attackers to capture data or change the operations performed in sessions protected by SSL.

The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle the WindowServer sessions. Successful exploitation allows attackers to execute arbitrary code outside the sandbox.

The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle errors during processing of a nonstandard extension in a Certificate Revocation list (CRL). Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user.

The host is installed with Apple Mac OS X or Server 10.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to denial of service.


Pages:      Start    1604    1605    1606    1607    1608    1609    1610    1611    1612    1613    1614    1615    1616    1617    ..   1628

© SecPod Technologies