[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Apple Mac OS X 10.5.8 or 10.6.0 through 10.6.7 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle Type 1 fonts. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.6 through v10.6.7 and is prone to an arbitrary directory listing vulnerability. A flaw is present in the application, which fails to validate the path properly. Successful exploitation could allow any person with FTP access to list all the files recursively.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle JPEG2000 images. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6 through v10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the IPV6 sockets. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which discloses the addresses of heap buffer. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which uses cleartext HTTP session to read e-mail addresses. Successful exploitation could allow a privileged attacker to retrieve an user's email aliases.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.8 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to validate patch files. Successful exploitation could allow attackers to create or overwrite arbitrary files.

The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle Microsoft office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle file descriptor's. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X Server 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an XML-RPC request containing an entity declaration in conjunction with an entity reference. Successful exploitation could allow attackers to crash the service.


Pages:      Start    724    725    726    727    728    729    730    731    732    733    734    735    736    737    ..   828

© SecPod Technologies