![]() Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code executionĭescription: A signedness issue existed in ATS' handling of Type 1 fonts. Impact: Executing a binary with a maliciously crafted name may lead to arbitrary code execution with elevated privilegesĭescription: A format string vulnerability existed in Application Firewall's debug logging.Īvailable for: OS X Lion v10.7 and v10.7.1, OS X Lion Server v10.7 and v10.7.1 ![]() Further information is available via the Apache web site at CVE-2011-0419 does not affect OS X Lion systems. Impact: Multiple vulnerabilities in Apacheĭescription: Apache is updated to version 2.2.20 to address several vulnerabilities, the most serious of which may lead to a denial of service. Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 and v10.7.1, OS X Lion Server v10.7 and v10.7.1
0 Comments
Leave a Reply. |