[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memory-layout information.

The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memory-layout information.

The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memory-layout information.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to cause a denial of service (NULL pointer dereference and device restart).

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Mach ports. Successful exploitation allows attackers to gain privileges or cause a denial of service (device crash).

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful exploitation allows attackers to execute arbitrary code in a privileged context.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful exploitation allows attackers to execute arbitrary code in a privileged context.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle incomplete resource envelopes in signed bundles. Successful exploitation allows attackers to bypass intended app-author restrictions.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an application that makes crafted IOKit function calls. Successful exploitation allows attackers to obtain sensitive memory-content information.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted call. Successful exploitation allows attackers to cause a denial of service (out-of-bounds read and device crash).


Pages:      Start    7549    7550    7551    7552    7553    7554    7555    7556    7557    7558    7559    7560    7561    7562    ..   19541

© SecPod Technologies