[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8059 Download | Alert*

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly process an HTTPS request. Successful exploitation allows remote attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle when hint was set in Disk Utility while creating an APFS encrypted volume, the password will be stored as the hint. Successful exploitation could allow attackers to gain access to an encrypted APFS volume.

The host is installed with Apple Mac OS X or Server 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a malicious application. Successful exploitation could allow attackers to bypass the keychain access prompt with a synthetic click.

The host is installed with Apple Safari before 11 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle crafted web content. Successful exploitation may lead attackers to a cross site scripting attack.

The host is installed with Apple Safari before 11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle website data in Safari Private windows. Successful exploitation allow attackers to access website data even after a Safari Private browsing session has ended.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the security state of the captive portal browser which was not obvious. Successful exploitation could allow attackers to send a password unencrypted over the network unknowingly.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a permission issue existed in the Apple ID. Successful exploitation could allow attackers to determine the Apple ID of the owner of the computer.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly propagate the applied settings. Successful exploitation could allow attackers to determine the IP address of the recipient.

The host is installed with Xcode before 9.0 on Apple Mac OS X 10.12.6 or later and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle maliciously crafted Mach-O file.Successful exploitation may lead to Multiple memory corruption vulnerability

The host is installed with Xcode before 9.0 on Apple Mac OS X 10.12.6 or later and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle maliciously crafted Mach-O file.Successful exploitation may lead to Multiple memory corruption vulnerability


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   805

© 2013 SecPod Technologies