[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16002 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to disclosure of sensitive information.

The host is installed with Xcode before 11.3 on Apple Mac OS X 10.14.4 or later and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted file. Successful exploitation may lead to arbitrary code execution.

The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted may cause arbitrary files to be removed with the privileges of the perl process

The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted may cause arbitrary files to be removed with the privileges of the perl process

The host is installed with Apple Remote Desktop 3.5.2 or 3.6.0 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to recognize the "Encrypt all network data" setting during connections to third-party VNC servers. Successful exploitation allows remote attackers to obtain cleartext VNC session content by sniffing the network.

The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to downgrade the TLS session security and potentially recover keys.

The host is installed with Apple Mac OS X before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple Remote Desktop 3.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to maintain a secure connection to a 3rd party VNC server when "Encrypt all network data" is set. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the combination of signed negative responses and corresponding RRSIG records in the cache. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to determine the security status of an NS RRset during a DNSKEY algorithm rollover. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1570    1571    1572    1573    1574    1575    1576    1577    1578    1579    1580    1581    1582    1583    ..   1600

© SecPod Technologies