[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16289 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected system termination or arbitrary code execution in the kernel.

The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly sanitize inputs before invoking the execute or system functional. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.5.5 or 105.8 and is prone to an arbitrary shell command execution vulnerability. A flaw is present in the application, which fails to properly handle escape characters. Successful exploitation could allow attackers to execute arbitrary shell commands.

The host is installed with Privoxy before 3.0.21 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle Proxy-Authenticate and Proxy-Authorization headers in the client-server data stream. Successful exploitation could allow attackers to spoof the intended proxy service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple integer overflow vulnerability. A flaw is present in the application, which fails to handle ciphertext with a length that is too short to be valid. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to double free vulnerability. A flaw is present in the application, which fails to handle a request associated with (1) renewal or (2) validation. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted Wiki content. Successful exploitation allows remote attackers to inject arbitrary web script or HTML .

A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly validate XML content. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then in ...

An elevation of privilege vulnerability exists when the Microsoft AutoUpdate (MAU) application for Mac improperly validates updates before executing them. An attacker who successfully exploited the vulnerability who already has the ability to execute code on a system could elevate privileges.

A security feature bypass vulnerability exists when Lync for Mac 2011 fails to properly sanitize specially crafted messages. An attacker who successfully exploited this vulnerability could cause a targeted Lync for Mac 2011 user's system to browse to an attacker-specified website or automatically download file types on the operating system's safe file type list. For an attacker to exploit the vuln ...


Pages:      Start    1605    1606    1607    1608    1609    1610    1611    1612    1613    1614    1615    1616    1617    1618    ..   1628

© SecPod Technologies