[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110210

 
 

909

 
 

86021

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9077 Download | Alert*

The host is installed with Apple Mac OS X 10.13.4 and is prone to a stack buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle php version less than 7.1.16. Successful exploitation allows attackers to execute arbitrary code in the context of the affected application.

The host is installed with Apple Mac OS X 10.12.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle permission issues in which execute permission is incorrectly granted. On successful exploitation, a local user may be able to view sensitive information.

The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issue. On successful exploitation, an application may be able to gain elevated privileges.

The host is installed with Apple Mac OS X 10.11.6, 10.12.6 or 10.13.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in systems using Intel Core-based microprocessors. Successful exploitation allows a local process to infer data utilizing Lazy FP state restore from another process through a speculative execution ...

The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. On successful exploitation, a malicious application may be able to break out of its sandbox.

The host is installed with Apple Mac OS X 10.13.5 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle spoofing issues in URL. Successful exploitation allows attackers to spoof address bars.

The host is installed with Apple Mac OS X 10.13.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an out-of-bounds read issue. On successful exploitation, a local user may be able to read kernel memory.

The host is installed with Apple Mac OS X 10.13.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an out-of-bounds read issue. On successful exploitation, a local user may be able to read kernel memory.

The host is installed with Apple Mac OS X 10.13.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle cookie management issues. Successful exploitation may cause cookies to unexpectedly persist.

The host is installed with Apple Mac OS X 10.13.5 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation causes a malicious application to gain root privileges.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   907

© SecPod Technologies