[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9411 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a previously visited web site that is rendered during a Quick Look search. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly implement authentication. Successful exploitation allows local users to obtain admin privileges.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted Unicode string. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle a text file containing an XML external entity declaration in conjunction with an entity reference. Successful exploitation allows remote attackers to read arbitrary files.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a malformed DMG image. Successful exploitation allows local users to gain privileges or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Safari before 9 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to bypass an intended single-cookie restriction.

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to bypass intended telephone-call restrictions.

The host is installed Wireshark 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly check the length of the payload. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and application crash).

The host is installed Wireshark 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a lack of \0 termination. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and application crash).


Pages:      Start    814    815    816    817    818    819    820    821    822    823    824    825    826    827    ..   941

© SecPod Technologies