[Forgot Password]
Login  Register Subscribe

24547

 
 

132805

 
 

131537

 
 

909

 
 

108762

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 10817 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, 10.8 through 10.8.5 or 10.9 through 10.9.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the Bash's parsing of environment variables, which fails to properly handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 or 10.10.x before 10.10.2 and is prone to a man-in-the-middle vulnerability. A flaw is present in the application, which fails to properly handle a padding-oracle attack. Successful exploitation allows attackers to decrypt data protected by SSL.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead to arbitrary code execution.

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then ins ...

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then ins ...

The host is installed with Google Chrome before 75.0.3770.80 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 75.0.3770.80 and is prone to a cross-origin resources size disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 75.0.3770.80 and is prone to an incorrect CORS handling vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 75.0.3770.80 and is prone to an incorrect map processing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1081

© SecPod Technologies