[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle errors during processing of a nonstandard extension in a Certificate Revocation list (CRL). Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user.

The host is installed with Apple Mac OS X or Server 10.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to denial of service.

The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected system termination or arbitrary code execution in the kernel.

The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly sanitize inputs before invoking the execute or system functional. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.5.5 or 105.8 and is prone to an arbitrary shell command execution vulnerability. A flaw is present in the application, which fails to properly handle escape characters. Successful exploitation could allow attackers to execute arbitrary shell commands.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple integer overflow vulnerability. A flaw is present in the application, which fails to handle ciphertext with a length that is too short to be valid. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to double free vulnerability. A flaw is present in the application, which fails to handle a request associated with (1) renewal or (2) validation. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted Wiki content. Successful exploitation allows remote attackers to inject arbitrary web script or HTML .

The host is installed with Privoxy before 3.0.21 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle Proxy-Authenticate and Proxy-Authorization headers in the client-server data stream. Successful exploitation could allow attackers to spoof the intended proxy service.


Pages:      Start    810    811    812    813    814    815    816    817    818    819    820    821    822    823    ..   827

© SecPod Technologies