[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Apple Mac OS X before 10.6.3 and is prone to a nil credentials authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle an invalid username without a password. Successful exploitation could allow attackers to bypass authentication for applications.

The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Successful exploitation allows man-in-the-middle attackers to spoof arbitrary SSL servers.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Google Chrome before 44.0.2403.89 or apple iTunes before 12.6 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted XML data. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted COLLATE clause. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle via a crafted CHECK clause. Successful exploitation could allow context-dependent attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 or Apple iTunes before 12.6 and is prone to an integer and stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle large integers in a crafted printf function call in a SELECT statement. Successful exploitation could allow context-dependent attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to verify the relationships between size arguments and byte string lengths. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large fragment, as demonstrated by a call to audioop.lin2lin with a long string in the first argument. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 or Apple iTunes before 12.6 and is prone to denial a of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML file. Successful exploitation could allow context-dependent attackers to cause denial of service (memory consumption).


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   827

© SecPod Technologies