[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195805 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an XML file. Successful exploitation could allow remote attackers to cause a denial of service (CPU consumption).

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted package. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted package. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to spoof the Keychain Server.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted mach message. Successful exploitation could allow local users to gain privileges.

The host is missing a security update according to Mozilla advisory, MFSA2015-135. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle crafted javascript variable assignments. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA2015-136. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted javascript code that leverages history. Successful exploitation allows remote attackers to bypass the same origin policy and obtain sensitive information.

The host is missing a security update according to Mozilla advisory, MFSA2015-137. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to handle HTTP Cookie headers. Successful exploitation allows remote attackers to obtain sensitive information.


Pages:      Start    7555    7556    7557    7558    7559    7560    7561    7562    7563    7564    7565    7566    7567    7568    ..   19580

© SecPod Technologies