[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197732 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly validate special characters. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly enforce the no-ssl3 build option. Successful exploitation allows attackers to bypass intended access restriction.

The host is installed with Apple Mac OS X or Server 10.8.5 or 10.9.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which allowed sandboxed applications to gain write access to the cache. Successful exploitation allows attackers to circumvent sandbox restrictions.

The host is installed with Apple Mac OS X or Server 10.8.5 or 10.9.5 and is prone to multiple out of bounds write vulnerabilities. The flaws are present in the application, which fails to properly perform bounds checking. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x before 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly evaluate cached application certificate information. Successful exploitation allows attackers to bypass Gatekeeper checks.

The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted app with a signature from a (1) self-signed certificate or (2) Developer ID certificate. Successful exploitation allows attackers to access keychain items belonging to other apps.

The host is installed with Apple Mac OS X or Server 10.10.x before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to check the status of Mail's "Load remote content in messages" setting. Successful exploitation allows attackers to determine the IP address of the recipient.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.x before 10.10.2 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not properly manage memory. Successful exploitation allows attackers to obtain sensitive information by reading from this drive.

The host is installed with Apple Mac OS X or Server 10.x before 10.10.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to perform proper bounds checking. Successful exploitation allows attackers to read files for which they do not have sufficient privileges.

The host is installed with Apple Mac OS X or Server 10.9.5 or before 10.10.x before 10.10.2 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to perform proper type checking. Successful exploitation allows a local application to escalate privileges.


Pages:      Start    8161    8162    8163    8164    8165    8166    8167    8168    8169    8170    8171    8172    8173    8174    ..   19773

© SecPod Technologies