This vulnerability allows an attacker to cause a panic in the OS X and iOS operating systems, resulting in a denial of service condition. It can be exploited by sending a specially crafted panic log to the target device. The vulnerability has been identified in OS X and iOS versions prior to the patched versions mentioned in the advisories.
The text does not provide any detailed relevant description related to the exploit and CVE in maximum words possible.
No detailed description provided.
The _ool variations of the IOKit device.defs functions incorrectly handle error conditions. Specifically, the code declares an io_object_t existing on the stack and passes its address to the is_io_service_get_matching_services_ool function. If the function succeeds, the value of existing is passed to iokit_make_object_port.
Unknown
This exploit targets a buffer overflow vulnerability in Eudora 7.1.0.9. It allows an attacker to execute arbitrary commands on the target system. The exploit code is written in Python and includes a shellcode to execute the 'calc.exe' command on Windows systems. Note that this vulnerability can only be exploited if the user ignores the warning about the buffer overflow error.
Wiser is prone to an information-disclosure vulnerability because it fails to sufficiently validate user-supplied data. An attacker can exploit this issue to download backup files that contain sensitive information. Information harvested may aid in launching further attacks.
An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Due to the nature of this issue, code-execution may be possible; however this has not been confirmed.
This exploit targets the XOOPS Module MyConference 1.0 index.php file and allows an attacker to perform a blind SQL injection attack. The exploit retrieves user credentials (username and password) from the xoops_users table by injecting a UNION SELECT statement.
A crash due to a static out-of-bounds read can be observed in an ASAN build of Wireshark when a malformed file is fed to tshark.