[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17560 Download | Alert*

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges.

The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a state related issue. Successful exploitation allows an attacker to initiate calls made by Suri using the wrong cellular plan on devices with two active plans.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a checks related issue. Successful exploitation allows an attacker to gain elevated privileges through an application.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a bounds check issue. Successful exploitation allows an attacker to perform a denial of service attack.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to perform arbitrary code execution via FaceTime app.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in OpenLDAP. Successful exploitation allows an attacker to encounter multiple issues.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle state management issue. Successful exploitation allows an attacker to make a mac may not lock immediately upon wake.

The host is installed with Apple Mac OS X or Server 10.11.6 or macOS Server before 5.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle HTTP_PROXY environment variable. Successful exploitation could allow remote attackers to proxy traffic through an arbitrary server.


Pages:      Start    1687    1688    1689    1690    1691    1692    1693    1694    1695    1696    1697    1698    1699    1700    ..   1755

© SecPod Technologies