[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a REPORT request for a resource that does not exist. Successful exploitation could allow remote remote attackers to cause a denial of service (NULL pointer dereference and server crash).

The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request for a URI that triggers a lookup for a virtual transaction name that does not exist. Successful exploitation could allow remote remote attackers to cause a denial of service (NULL pointer dereference a ...

The host is installed with Apple Mac OS X 10.9.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle YAML tags. Successful exploitation allows attackers to cause an unexpected application termination or arbitrary code execution.

The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation could allow man-in-the-middle attackers to spoof servers.

The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted authentication realm. Successful exploitation could allow remote servers to obtain the credentials.

The host is installed with Wireshark 1.10.0 before 1.10.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the conversion of a string to a floating point value. Successful exploitation allows attackers to cause an unexpected application termination or arbitrary code execution.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly process an HTTPS request. Successful exploitation allows remote attackers to crash the service.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to an uninitialized memory corruption vulnerability. A flaw is present in the application, which fails to properly handle specially crafted requests to a server. Successful exploitation allows remote attackers to disclose potentially sensitive information or cause httpd child process to crash.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a read after free vulnerability. A flaw is present in the application, which fails to properly handle stress while closing multiple connections. Successful exploitation allows remote attackers to access memory after it has been freed.


Pages:      Start    770    771    772    773    774    775    776    777    778    779    780    781    782    783    ..   827

© SecPod Technologies