[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195105 Download | Alert*

The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 or 10.10.x before 10.10.2 and is prone to a man-in-the-middle vulnerability. A flaw is present in the application, which fails to properly handle a padding-oracle attack. Successful exploitation allows attackers to decrypt data protected by SSL.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted audio samples in an m4a file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted Wi-Fi AP. Successful exploitation allows attackers to calculate credentials by offering LEAP authentication from a crafted Wi-Fi AP and then performing a cryptographic attack against the MS-CHAPv1 ha ...

The host is installed with Apple Mac OS X or Server before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memory-layout information.

The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memory-layout information.

The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memory-layout information.

The host is installed with Apple Mac OS X or Server 10.8, 10.9 or before 10.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to obtain sensitive memory-content and memory-layout information.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to cause a denial of service (NULL pointer dereference and device restart).

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Mach ports. Successful exploitation allows attackers to gain privileges or cause a denial of service (device crash).

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle an application that provides crafted values in unspecified metadata fields. Successful exploitation allows attackers to execute arbitrary code in a privileged context.


Pages:      Start    7555    7556    7557    7558    7559    7560    7561    7562    7563    7564    7565    7566    7567    7568    ..   19510

© SecPod Technologies