[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16216 Download | Alert*

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly unpack a maliciously crafted archive. Successful exploitation allows attackers to execute arbitrary code system privileges.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly unpack a maliciously crafted archive. Successful exploitation allows attackers to execute arbitrary code system privileges.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code system privileges.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation allows attackers to read restricted memory.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform input sanitization. Successful exploitation allows attackers to read restricted memory.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation allows attackers to execute arbitrary code with system privileges.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform memory handling. Successful exploitation allows attackers to execute arbitrary code with system privileges.

The host is installed with Apple Mac OS X before 10.13.1 and is prone to a local file read vulnerability. A flaw is present in the application, which fails to properly handle DMA. Successful exploitation could allow attackers to read APFS files on the affected system using a Thunderbolt adapter.

The host is installed with Apple Mac OS X before 10.13.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with system privileges.

The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or before 10.13.1 and is prone to a local information disclosure vulnerability. A flaw is present in the application, which fails to properly handle validation issue. Successful exploitation could allow attackers to obtain sensitive information on the affected system.


Pages:      Start    1540    1541    1542    1543    1544    1545    1546    1547    1548    1549    1550    1551    1552    1553    ..   1621

© SecPod Technologies