[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15795 Download | Alert*

The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to cause memory corruption.

The host is installed with Apple MacOS X before 10.15 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vector. Successful exploitation may be able to passively observe device names in AWDL communications.

The host is installed with Apple MacOS X before 10.15 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution.

The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a unknown vector. Successful exploitation could allow attackers to check for the existence of arbitrary files.

The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with system privileges.

The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted text file. Successful exploitation may lead to disclosure of user information.

The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, processing a maliciously crafted STL file may lead to unexpected application termination or arbitrary code e ...

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions validation issue. On successful exploitation, application may be able to access restricted files.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. On successful exploitation, malicious application may be able to execute arbitrary code with kernel privileges.


Pages:      Start    1158    1159    1160    1161    1162    1163    1164    1165    1166    1167    1168    1169    1170    1171    ..   1579

© SecPod Technologies