[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

116471

 
 

909

 
 

91176

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 90791 Download | Alert*

Alexander E. Patrakov discovered an issue in strongSwan, an IKE/IPsec suite used to establish IPsec protected links. When an IKEv2 client authenticates the server with certificates and the client authenticates itself to the server using pre-shared key or EAP, the constraints on the server certificate are only enforced by the client after all authentication steps are completed successfully. A rogue ...

Johannes Kliemann discovered a vulnerability in ownCloud Desktop Client, the client-side of the ownCloud file sharing services. The vulnerability allows man-in-the-middle attacks in situations where the server is using self-signed certificates and the connection is already established. If the user in the client side manually distrusts the new certificate, the file syncing will continue using the m ...

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted font file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4, 10.11.x before 10.11.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML document. Successful exploitation allows attackers to obtain sensitive information from process memory or cause a denial of service (memory co ...

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an arbitrary user password change vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to change arbitrary user passwords.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a kernel memory-layout information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation allows attackers to obtain sensitive kernel memory-layout information.

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly restrict Notification Center Service access. Successful exploitation allows attackers to read Notification Center notifications of certain paired devices.


Pages:      Start    7950    7951    7952    7953    7954    7955    7956    7957    7958    7959    7960    7961    7962    7963    ..   9079

© SecPod Technologies