[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17290 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted pathname. Successful exploitation could allow local users to gain privileges.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted disk image. Successful exploitation could allow local users to gain privileges or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a malformed media file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a malformed media file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to bypass intended configuration-profile installation restrictions.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted URL. Successful exploitation could allow remote attackers to bypass the HSTS protection mechanism.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted unspecified vectors. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow remote attackers to bypass contacts access revocation.


Pages:      Start    1680    1681    1682    1683    1684    1685    1686    1687    1688    1689    1690    1691    1692    1693    ..   1728

© SecPod Technologies