[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an This vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to access restricted files.

The host is installed with Apple Mac OS before 11.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may disclose restricted memory.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an This vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to bypass Privacy preferences.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code execution.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an This vulnerability. A flaw is present in the application, which fails to properly handle issues in improved environment sanitization. On successful exploitation, a malicious application may be able to break out of its sandbox.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to execute arbitrary code with system privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to a certificate parsing vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious app may be able to bypass signature validation.


Pages:      Start    8167    8168    8169    8170    8171    8172    8173    8174    8175    8176    8177    8178    8179    8180    ..   19630

© SecPod Technologies