[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87854

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9283 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an environment variable. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process eSCL packets. Successful exploitation could allow attackers to extract payload from eSCL packets sent over a secure connection.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted app. Successful exploitation could allow attackers to obtain access to keychain items.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle attempts to send events to a different user. Successful exploitation could allow attackers to bypass intended access restrictions by leveraging a screen-sharing connection.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle audio files. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle top level domains. Successful exploitation could allow attackers in a privileged network position to track a user's activity.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle FTP packets when using the PASV command. Successful exploitation could allow attackers to cause the client to perform reconnaissance on other hosts.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a HSTS protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted URL. Successful exploitation could allow attackers to bypass the HSTS protection mechanism, and consequently obtain sensitive information.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to bypass the Safari private-browsing protection mechanism.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a cookie-injection attack vulnerability. A flaw is present in the application, which fails to properly handle a crafted response. Successful exploitation could allow remote proxy servers to conduct cookie-injection attacks.


Pages:      Start    791    792    793    794    795    796    797    798    799    800    801    802    803    804    ..   928

© SecPod Technologies