[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15910 Download | Alert*

The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a unknown vector. Successful exploitation could allow attackers to check for the existence of arbitrary files.

The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with system privileges.

The host is installed with Apple MacOS X 10.13.6 or 10.14.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted text file. Successful exploitation may lead to disclosure of user information.

The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, processing a maliciously crafted STL file may lead to unexpected application termination or arbitrary code e ...

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions validation issue. On successful exploitation, application may be able to access restricted files.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.3 or Apple Mac OS 12 before 12.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. On successful exploitation, malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. On successful exploitation, a local user may be able to modify protected parts of the file system.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.


Pages:      Start    1171    1172    1173    1174    1175    1176    1177    1178    1179    1180    1181    1182    1183    1184    ..   1590

© SecPod Technologies