[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108684

 
 

909

 
 

85446

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 8507 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.10.x before 10.10.2 and is prone to a directory spoofing vulnerability. A flaw is present in the application, which fails to validate crafted data. Successful exploitation allows attackers to spoof directory service responses to the kernel, elevate privileges, or gain kernel execution.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle certain metadata fields. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle APIs related to kernel extensions. Successful exploitation allows attackers to obtain kernel addresses.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted JAR archive. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle interprocess communication. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to transition to the lock-screen state immediately upon being woken from sleep. Successful exploitation allows attackers to obtain sensitive information by reading the screen.

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted session ticket. Successful exploitation allows physically proximate attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly validate special characters. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly enforce the no-ssl3 build option. Successful exploitation allows attackers to bypass intended access restriction.

The host is installed with Apple Mac OS X or Server 10.8.5 or 10.9.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which allowed sandboxed applications to gain write access to the cache. Successful exploitation allows attackers to circumvent sandbox restrictions.


Pages:      Start    772    773    774    775    776    777    778    779    780    781    782    783    784    785    ..   850

© SecPod Technologies