[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

144795

 
 

909

 
 

116392

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 11610 Download | Alert*

The host is installed with Apple Mac OS X 10.15.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a symlinks validation issue. Successful exploitation allow attackers to elevate their privileges.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to break out of its sandbox through a malicious application.

The host is installed with Apple Mac OS X 10.15.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to gain elevated privileges through an application.

The host is installed with Apple Mac OS X 10.13.6 or 10.14.6 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to leak sensitive user information.

The host is installed with Apple Mac OS X 10.15.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to exfiltrate user information while importing a maliciously crafted calendar invitation.

The host is installed with Apple Mac OS X 10.15.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to determine kernel memory layout through a malicious application.

The host is installed with Apple Mac OS X 10.15.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to perform arbitrary code execution while processing a maliciously crafted audio file.

The host is installed with Apple Mac OS X 10.15.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to perform arbitrary code execution while processing a maliciously crafted audio file.

The host is installed with Apple Mac OS X 10.15.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause a kernel panic by inserting a USB device that sends invalid messages.

The host is installed with Apple Mac OS X 10.13.6 or 10.15.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an entitlement parsing issue. Successful exploitation allows an attacker to interact with system processes to access private information and perform privileged actions.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   1160

© SecPod Technologies