[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17161 Download | Alert*

The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a size validation issue. Successful exploitation allows an attacker to cause an unexpected application termination or arbitrary code execution.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues.

The host is installed with Xcode before 10 on Apple Mac OS 10.13.6 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in input validation. On succesful exploitation, attacker could execute arbitrary code with kernel privileges.

The host is installed with Xcode before 9.3 on Apple Mac OS 10.13.2 or later and is prone to multiple issues. A flaw is present in the application, which fails to properly handle issues in llvm. Successful exploitation allows attacker to cause unspecified impact.

The host is installed with getenvoy-envoy version 1.29.0 before 1.29.3, 1.28.0 before 1.28.2, 1.27.0 before 1.27.4, or before 1.26.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in HTTP/2 codec. On successful exploitation, An attacker can send a sequence of CONTINUATION frames without the END_HEADERS bit set causing ...

The host is installed with getenvoy-envoy version 1.29.0 before 1.29.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in HTTP/2 codec. On successful exploitation, An attacker can to send a sequence of CONTINUATION frames without the END_HEADERS bit set causing unlimited memory consumption.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle passwords with 8-bit characters. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Java 1.6.0_29 before 1.6.0_31 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to CORBA. Successful exploitation could allow remote attackers to affect integrity.

The host is installed with Oracle Java 1.6.0_45 and is prone to an unspecified vulnerability. The flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.

The host is installed with Apple Mac OS before 13.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in improved checks. On successful exploitation, a user may be able to cause unexpected app termination or arbitrary code execution.


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   1716

© SecPod Technologies