[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197121 Download | Alert*

The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issue. On successful exploitation, a malicious application may be able to gain root privileges.

The host is installed with Apple Mac OS X 10.14.6 or 10.15.7 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle improper environment sanitization. On successful exploitation, a malicious application may be able to break out of its sandbox.

The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, processing a maliciously crafted font may result in the disclosure of process memory.

The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, an unprivileged application may be able to capture USB devices.

The host is installed with Apple Mac OS 11.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle improper input validation. On successful exploitation, processing a maliciously crafted font may result in the disclosure of process memory.

The host is installed with Apple Mac OS 11.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle improper input validation. On successful exploitation, processing a maliciously crafted font may result in the disclosure of process memory.

The host is installed with Apple Mac OS 11.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle improper checks. On successful exploitation, processing a maliciously crafted image may lead to disclosure of user information.

The host is installed with Apple Mac OS 11.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a privacy issue. On successful exploitation, a local attacker may be able to view Now Playing information from the lock screen.

The host is installed with Apple Mac OS 11.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper data protection. On successful exploitation, a malicious application may be able to bypass certain Privacy preferences.


Pages:      Start    11092    11093    11094    11095    11096    11097    11098    11099    11100    11101    11102    11103    11104    11105    ..   19712

© SecPod Technologies