[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive kernel memory-layout information.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly restrict Notification Center Service access. Successful exploitation allows attackers to read Notification Center notifications of certain paired devices.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle malformed Bluetooth ACL packets. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to multiple buffer overflows vulnerabilities. The flaws are present in the application, which fails to handle XPC messages. Successful exploitation allows attackers to gain privileges.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to obtain potentially sensitive information about MAC addresses seen in previous Wi-Fi sessions by sniffing an 802.11 network for DNAv4 broadcast tra ...

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to access an iCloud user record associated with a previous user's login session.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle IP addresses in cookie domain names. Successful exploitation allows attackers to set cookies for or send arbitrary cookies to certain sites.


Pages:      Start    715    716    717    718    719    720    721    722    723    724    725    726    727    728    ..   828

© SecPod Technologies