[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Apple Mac OS X Server 10.5.8 or 10.6 through 10.6.7 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle attack vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments". Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X Server 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to prevent re-evaluation of an expression. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X Server and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted queries. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X Server 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an errors that occurs when a copied object is modified in a way that it affects the original object. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X Server 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a query with GREATEST or LEAST function with a mixed list of numeric and LONGBLOB arguments. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a NULL return value. Successful exploitation may have unspecified impact.

The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to prevent modification of the ciphersuite in the session cache. Successful exploitation could allow attackers to discover a session identifier.

The host is installed with Apple Mac OS X 10.6 through 10.6.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an out-of-bounds memory access. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a glob pattern from an untrusted application. Successful exploitation may allow attackers to crash the service.

The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    726    727    728    729    730    731    732    733    734    735    736    737    738    739    ..   828

© SecPod Technologies