[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 8507 Download | Alert*

The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle serialized objects. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.10.2 and is prone to an ASLR bypass vulnerability. A flaw is present in the application, which fails to properly handle malicious or compromised applications. Successful exploitation could allow attackers to determine addresses in the kernel.

The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to downgrade the TLS session security and potentially recover keys.

The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation could allow man-in-the-middle attackers to spoof servers.

The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted authentication realm. Successful exploitation could allow remote servers to obtain the credentials.

The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a REPORT request for a resource that does not exist. Successful exploitation could allow remote remote attackers to cause a denial of service (NULL pointer dereference and server crash).

The host is installed with Xcode before 6.2 on Apple Mac OS X 10.9.4 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request for a URI that triggers a lookup for a virtual transaction name that does not exist. Successful exploitation could allow remote remote attackers to cause a denial of service (NULL pointer dereference a ...

The host is installed with Xcode before 6.3 on Apple Mac OS X 10.9.4 or later and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly perform check before type conversions. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows attackers to produce unspecified impact.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a header in the trailer portion of data sent with chunked transfer coding. Successful exploitation allows attackers to remote attackers to bypass "RequestHeader unset" directives.


Pages:      Start    774    775    776    777    778    779    780    781    782    783    784    785    786    787    ..   850

© SecPod Technologies