[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers may gain access to privileged applications.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to exploit weaknesses in the 3DES cryptographic algorithm.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow certificates may be unexpectedly evaluated as trusted.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to gain root privileges.

The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted imagefilltoborder call that triggers use of a negative color value. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a crafted serialized data in a wddxPacket XML document. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.


Pages:      Start    737    738    739    740    741    742    743    744    745    746    747    748    749    750    ..   828

© SecPod Technologies