[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a Trojan horse program that is loaded from an unexpected directory by an application that has a valid Apple digital signature. Successful exploitation could allow local users to bypass intended Gateke ...

The host is installed with Apple Mac OS 10.8 before 10.13.1 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation allows attackers to produce unspecified impact.

A spoofing vulnerability exists when Microsoft Outlook for MAC does not properly handle the encoding and display of email addresses. This improper handling and display may cause antivirus or antispam scanning to not work as intended. To exploit the vulnerability, an attacker could send a specially crafted email attachment to a user in an attempt to launch a social engineering attack, such as phish ...

The host is installed with Xcode before 6.3 on Apple Mac OS X 10.9.4 or later and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly perform check before type conversions. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X before 10.7.2 and is prone to format string vulnerability. A flaw is present in the application, which fails to handle a crafted name of an executable file. Successful exploitation could allow attackers to gain elevated privileges.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.2 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to perform improved memory reference tracking. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle cookies properly. Successful exploitation could allow attackers to set cookies that would be blocked were the preference enforced.

The host is installed with Apple Mac OS X or Server 10.10.5 before update 2016-005 or 10.11.6 before update 2016-001 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to disclose kernel memory.

The host is installed with Apple Mac OS X or Server 10.12 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted font. Successful exploitation may lead to disclose sensitive user information.

The host is installed with Apple Mac OS X Sever 10.5.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to restrict the file types of uploaded files. Successful exploitation could allow attackers to gain sensitive information.


Pages:      Start    813    814    815    816    817    818    819    820    821    822    823    824    825    826    ..   827

© SecPod Technologies