[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110204

 
 

909

 
 

85984

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 8507 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.8.5 or 10.9.5 and is prone to multiple out of bounds write vulnerabilities. The flaws are present in the application, which fails to properly perform bounds checking. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10 before 10.10.2 and is prone to a heap based buffer overflow vulnerability. The flaws are present in the application, which fails to properly perform bounds checking. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x before 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly evaluate cached application certificate information. Successful exploitation allows attackers to bypass Gatekeeper checks.

The host is installed with Apple Mac OS X or Server 10.9.5 or 10.10.x before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted app with a signature from a (1) self-signed certificate or (2) Developer ID certificate. Successful exploitation allows attackers to access keychain items belonging to other apps.

The host is installed with Apple Mac OS X or Server 10.10.x before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to check the status of Mail's "Load remote content in messages" setting. Successful exploitation allows attackers to determine the IP address of the recipient.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.x before 10.10.2 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not properly manage memory. Successful exploitation allows attackers to obtain sensitive information by reading from this drive.

The host is installed with Apple Mac OS X or Server 10.x before 10.10.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to perform proper bounds checking. Successful exploitation allows attackers to read files for which they do not have sufficient privileges.

The host is installed with Apple Mac OS X or Server 10.9.5 or before 10.10.x before 10.10.2 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to perform proper type checking. Successful exploitation allows a local application to escalate privileges.

The host is installed with Apple Mac OS X or Server 10.x before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle password-protected PDF files created from the Print dialog. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apple Mac OS X 10.10.2 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly perform bounds checking. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    773    774    775    776    777    778    779    780    781    782    783    784    785    786    ..   850

© SecPod Technologies