[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Word for Office 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Word for Office 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Microsoft Autoupdater for Mac and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Adobe Digital Editions before 4.5.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to lead to a memory address leak.

The host is installed with Adobe Digital Editions before 4.5.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to disclose information.

The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle apache_mod_php. Successful exploitation could allow attackers to cause an unexpected application termination or arbitrary code execution.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow local user to cause system denial of service.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle access restrictions. Successful exploitation could allow local attacker to modify downloaded mobile assets.


Pages:      Start    731    732    733    734    735    736    737    738    739    740    741    742    743    744    ..   828

© SecPod Technologies