[Forgot Password]
Login  Register Subscribe

24544

 
 

132176

 
 

121239

 
 

909

 
 

98883

 
 

148

 
 
Paid content will be excluded from the download.

Filter
Matches : 94232 Download | Alert*

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a DLL in the PPSAPI_DLLS environment variable. Successful exploitation could allow attackers to gain privileges.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a certificate validation issue. Successful exploitation could allow attackers make to trust a revoked certificate.

The host is installed with Apple Mac OS X or Server 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a malicious application. Successful exploitation could allow attackers to bypass the keychain access prompt with a synthetic click.

The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a resource exhaustion vulnerability. A flaw is present in the application, which fails to properly handle crafted input. Successful exploitation could allow attackers to make an application to escape sandbox restrictions.

The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an access issue. Successful exploitation could allow attackers to make an application to escape sandbox restrictions.

The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation could allow attackers to read restricted memory.

The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle input sanitization. Successful exploitation could allow attackers to read restricted memory.

The host is installed with Apple Mac OS X or Server 10.12.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. An attacker within range may be able to execute arbitrary code on the Wi-Fi chip.


Pages:      Start    8748    8749    8750    8751    8752    8753    8754    8755    8756    8757    8758    8759    8760    8761    ..   9423

© SecPod Technologies