A vulnerability, which was classified as critical, was found in Apple iOS up to 9.0. This affects an unknown part of the component IOAcceleratorFamily. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2015-6996. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apple Mac OS X up to 10.11.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component ImageIO. The manipulation as part of Image Metadata leads to memory corruption.
This vulnerability is known as CVE-2015-5939. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple Mac OS X up to 10.11.0 and classified as very critical. Affected by this issue is some unknown functionality of the component IOAcceleratorFamily. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2015-6996. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apple iOS up to 9.0. Affected by this issue is some unknown functionality of the component ImageIO. The manipulation as part of Image Metadata leads to memory corruption.
This vulnerability is handled as CVE-2015-5939. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Apple Mac OS X up to 10.11.0. Affected is an unknown function of the component ImageIO. The manipulation as part of Image Metadata leads to memory corruption.
This vulnerability is traded as CVE-2015-5937. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A hacker allegedly accessed a file containing testimony from a woman claiming she had sex with Matt Gaetz when she was 17, sparking controversy. The New York Times reported that a hacker, who goes online with the name name Altam Beezley, gained access to files containing confidential testimony from a woman who claims she had […]
A vulnerability was found in KafooeyBlog 1.55b. It has been classified as critical. This affects an unknown part in the library lib/image_upload.php of the component File Upload. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2008-5732. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Entechtaiwan PowerStrip. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2008-5725. An attack has to be approached locally. Furthermore, there is an exploit available.
A vulnerability classified as very critical has been found in CoolPlayer 2.17/2.18/2.19. Affected is an unknown function of the file skin.c. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2008-5735. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Emefa Guestbook 3.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2008-5852. It is possible to launch the attack remotely. Furthermore, there is an exploit available.