[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16216 Download | Alert*

The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle memory corruption issues. On successful exploitation, a malicious application may be able to break out of its sandbox.

The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 or 10.13.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle improper validation. Successful exploitation allows an application to elevate privileges.

The host is installed with Apple Mac OS X 10.14.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to circumvent sandbox restrictions.

The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to elevate privileges through a malicious application.

The host is installed with Apple Mac OS X 10.13.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle cookie management issues. Successful exploitation may cause cookies to unexpectedly persist.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges.

The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a state related issue. Successful exploitation allows an attacker to initiate calls made by Suri using the wrong cellular plan on devices with two active plans.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a checks related issue. Successful exploitation allows an attacker to gain elevated privileges through an application.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to perform a denial of service attack.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to perform arbitrary code execution via FaceTime app.


Pages:      Start    1552    1553    1554    1555    1556    1557    1558    1559    1560    1561    1562    1563    1564    1565    ..   1621

© SecPod Technologies