The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issue. On successful exploitation, a malicious application may be able to gain root privileges.
The host is installed with Apple Mac OS X 10.14.6 or 10.15.7 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle improper environment sanitization. On successful exploitation, a malicious application may be able to break out of its sandbox.
The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.
The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.14.6 or 10.15.7 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, processing a maliciously crafted font may result in the disclosure of process memory.
The host is installed with Apple Mac OS 11 before 11.4 or Mac OS X 10.15.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper memory management. On successful exploitation, an unprivileged application may be able to capture USB devices.
The host is installed with Apple Mac OS 11.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle improper input validation. On successful exploitation, processing a maliciously crafted font may result in the disclosure of process memory.
The host is installed with Apple Mac OS 11.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle improper input validation. On successful exploitation, processing a maliciously crafted font may result in the disclosure of process memory.
The host is installed with Apple Mac OS 11.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle improper checks. On successful exploitation, processing a maliciously crafted image may lead to disclosure of user information.
The host is installed with Apple Mac OS 11.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a privacy issue. On successful exploitation, a local attacker may be able to view Now Playing information from the lock screen.
The host is installed with Apple Mac OS 11.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper data protection. On successful exploitation, a malicious application may be able to bypass certain Privacy preferences.