[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15834 Download | Alert*

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11 before 11.6.2 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory handling issue. On successful exploitation, processing a maliciously crafted USD file may disclose memory content.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a locking issue. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. On successful exploitation, a local user may be able to cause unexpected system termination or read kernel memory.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory handling issue. On successful exploitation, processing a maliciously crafted USD file may disclose memory content.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. On successful exploitation, a local attacker may be able to elevate their privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, a malicious application may bypass Gatekeeper checks.


Pages:      Start    1051    1052    1053    1054    1055    1056    1057    1058    1059    1060    1061    1062    1063    1064    ..   1583

© SecPod Technologies