[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Apple Mac OS X 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, as it fails to handle lock tokens sent over http. Successful exploitation could allow attackers to crash the service.

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.0 or later and is prone to an information disclosure vulnerability. A flaw is present in the application, which uses a partial comparison for verifying whether a directory is within the document root. Successful exploitation could allow attackers to access restricted directories.

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later and is prone to a memory consumption vulnerability. A flaw is present in the application, which fails to handle a crafted handshake message. Successful exploitation could allow attackers to cause a denial of service (memory consumption).

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later and is prone to a memory consumption vulnerability. A flaw is present in the application, which does not ensure that server traffic is encrypted. Successful exploitation could allow attackers to obtain sensitive information by sniffing the network.

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later and is prone to a memory consumption vulnerability. A flaw is present in the application, which does not properly restrict access to repository e-mail lists. Successful exploitation could allow attackers to obtain potentially sensitive build information in opportunistic circumstances.

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly restrict access to repository e-mail lists. Successful exploitation could allow attackers to cause a denial of service (assertion failure and abort).

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later and is prone to a Spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted v1 HTTP protocol request sequences. Successful exploitation could allow remote authenticated users to spoof the svn:author property.

The host is installed with Apple Mac OS X Server 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, it fails to handle a join query that uses a table with a unique set column. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X Server 10.5.8 or 10.6 through 10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted SQL statements. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X Server and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to propagate type errors properly. Successful exploitation could allow attackers to crash the service.


Pages:      Start    725    726    727    728    729    730    731    732    733    734    735    736    737    738    ..   828

© SecPod Technologies