[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8285 Download | Alert*

The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle errors during processing of a nonstandard extension in a Certificate Revocation list (CRL). Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user.

The host is installed with Apple Mac OS X or Server 10.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to denial of service.

The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected system termination or arbitrary code execution in the kernel.

The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly sanitize inputs before invoking the execute or system functional. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.5.5 or 105.8 and is prone to an arbitrary shell command execution vulnerability. A flaw is present in the application, which fails to properly handle escape characters. Successful exploitation could allow attackers to execute arbitrary shell commands.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple integer overflow vulnerability. A flaw is present in the application, which fails to handle ciphertext with a length that is too short to be valid. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to double free vulnerability. A flaw is present in the application, which fails to handle a request associated with (1) renewal or (2) validation. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted Wiki content. Successful exploitation allows remote attackers to inject arbitrary web script or HTML .


Pages:      Start    811    812    813    814    815    816    817    818    819    820    821    822    823    824    ..   828

© SecPod Technologies