[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108566

 
 

909

 
 

85401

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 8883 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large size value. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly consider custom resource rules during app signature verification. Successful exploitation allows attackers to bypass intended launch restrictions.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly consider libraries that are external to an application bundle. Successful exploitation allows attackers to bypass intended launch restrictions.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary commands execution vulnerability. A flaw is present in the application, which fails to handle a crafted name of a photo file within the local photo library. Successful exploitation allows attackers to execute arbitrary commands.

The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly verify XPC entitlements. Successful exploitation allows attackers to bypass authentication and obtain admin privileges.

The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle authentication errors. Successful exploitation allows attackers to bypass authentication and obtain admin privileges.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly restrict the location of writeconfig clients. Successful exploitation allows attackers to obtain root privileges by moving and then modifying Directory Utility.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted URL. Successful exploitation allows attackers to bypass HTTP authentication.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive memory-layout information.


Pages:      Start    799    800    801    802    803    804    805    806    807    808    809    810    811    812    ..   888

© SecPod Technologies