[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17083 Download | Alert*

The host is installed with Xcode before 9.0 on Apple Mac OS X 10.12.6 or later and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle maliciously crafted Mach-O file.Successful exploitation may lead to Multiple memory corruption vulnerability

The host is installed with Apple Mac OS X or Server 10.11.6 or 10.10.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to disclosure of sensitive information.

The host is installed with Xcode before 11.3 on Apple Mac OS X 10.14.4 or later and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted file. Successful exploitation may lead to arbitrary code execution.

The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted may cause arbitrary files to be removed with the privileges of the perl process

The host is installed with Apple Mac OS X server before 10.5.8 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle symbolic links. Successful exploitation could allow local user with write access to a directory that is being deleted may cause arbitrary files to be removed with the privileges of the perl process

The host is installed with Apple Remote Desktop 3.5.2 or 3.6.0 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to recognize the "Encrypt all network data" setting during connections to third-party VNC servers. Successful exploitation allows remote attackers to obtain cleartext VNC session content by sniffing the network.

The host is installed with Apple Mac OS X 10.8.5, 10.9.5 or 10.10.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to downgrade the TLS session security and potentially recover keys.

The host is installed with Apple Mac OS X before 10.6.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple Remote Desktop 3.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to maintain a secure connection to a 3rd party VNC server when "Encrypt all network data" is set. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the combination of signed negative responses and corresponding RRSIG records in the cache. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1678    1679    1680    1681    1682    1683    1684    1685    1686    1687    1688    1689    1690    1691    ..   1708

© SecPod Technologies