[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17466 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted disk image. Successful exploitation could allow local users to gain privileges or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a malformed media file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a malformed media file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to bypass intended configuration-profile installation restrictions.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted URL. Successful exploitation could allow remote attackers to bypass the HSTS protection mechanism.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted unspecified vectors. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow remote attackers to bypass contacts access revocation.

The host is installed with Apple Mac OS X or Server before 10.10.1 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to obtain sensitive information.


Pages:      Start    1698    1699    1700    1701    1702    1703    1704    1705    1706    1707    1708    1709    1710    1711    ..   1746

© SecPod Technologies