[Forgot Password]
Login  Register Subscribe

24544

 
 

132176

 
 

121100

 
 

909

 
 

98726

 
 

148

 
 
Paid content will be excluded from the download.

Filter
Matches : 94133 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.12.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. An attacker within range may be able to execute arbitrary code on the Wi-Fi chip.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle an upgrade issue which existed in the handling of firewall settings. Successful exploitation could allow attackers to change a previously denied application firewall setting, which may take effect after upgrading.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a resource exhaustion issue in glob(), which was addressed through an improved algorithm. Successful exploitation could allow attackers to cause a denial-of-service

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an privilege escalation vulnerability. A flaw is present in the application, which fails to handle a memory consumption issue, which was addressed through improved memory handling. Successful exploitation could allow attackers to cause a denial-of-service.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an XML external entity vulnerability. A flaw is present in the application, which fails to handle a malformed external entity definition from an external DTD. Successful exploitation could allow attackers to put the parser in an infinite loop.

The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle cryptographic API calls. Successful exploitation could allow attackers to validate empty signatures.

The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly perform permissions checking. Successful exploitation could allow attackers to unexpectedly escalate privileges using sudo.

The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    8739    8740    8741    8742    8743    8744    8745    8746    8747    8748    8749    8750    8751    8752    ..   9413

© SecPod Technologies