[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110204

 
 

909

 
 

85984

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 8507 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a cryptographic protection mechanism vulnerability. A flaw is present in the application, which fails to properly calculate the square of a BIGNUM value. Successful exploitation allows remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted DTLS message. Successful exploitation allows remote attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted data within a certificate's unsigned portion. Successful exploitation allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a freak vulnerability. A flaw is present in the application, which fails to properly handle a weak ephemeral RSA key in a noncompliant role. Successful exploitation allows remote attackers to conduct RSA-to-EXPORT_RSA downgrade attacks.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted color table in an XPM file. Successful exploitation allows remote attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted iterator usage. Successful exploitation allows remote attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted ArrayIterator usage. Successful exploitation allows remote attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to an arbitrary file overwrite vulnerability. A flaw is present in the application, which fails to properly handle pathnames that lack %00 sequences. Successful exploitation allows remote attackers to overwrite arbitrary files .

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted iWork file. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.


Pages:      Start    777    778    779    780    781    782    783    784    785    786    787    788    789    790    ..   850

© SecPod Technologies