[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Xcode before 9.0 on Apple Mac OS X 10.12.6 or later and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle maliciously crafted Mach-O file.Successful exploitation may lead to Multiple memory corruption vulnerability

The host is installed with Xcode before 9.0 on Apple Mac OS X 10.12.6 or later and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle maliciously crafted Mach-O file.Successful exploitation may lead to Multiple memory corruption vulnerability

The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to disclosure of sensitive information.

The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted may cause arbitrary files to be removed with the privileges of the perl process

The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted may cause arbitrary files to be removed with the privileges of the perl process

The host is installed with Apple Remote Desktop 3.5.2 or 3.6.0 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to recognize the "Encrypt all network data" setting during connections to third-party VNC servers. Successful exploitation allows remote attackers to obtain cleartext VNC session content by sniffing the network.

The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to downgrade the TLS session security and potentially recover keys.

The host is installed with Apple Mac OS X before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple Remote Desktop 3.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to maintain a secure connection to a 3rd party VNC server when "Encrypt all network data" is set. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the combination of signed negative responses and corresponding RRSIG records in the cache. Successful exploitation could allow attackers to crash the service.


Pages:      Start    804    805    806    807    808    809    810    811    812    813    814    815    816    817    ..   827

© SecPod Technologies