[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17029 Download | Alert*

The host is installed with Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an authentication vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to view the previous logged-in user's desktop from the fast user switching screen.

The host is installed with Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a state validation issue. Successful exploitation allows an attacker to sync a user's messages even after the user has signed out of iMessage.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to disclose user information while processing a maliciously crafted file.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle bounds check issue. Successful exploitation allows an attacker to disclose memory contents while processing a maliciously crafted USD file.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows an attacker to gain access to a user's Keychain items.

The host is installed with Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. Successful exploitation allows an attacker to edit NVRAM variables using an unprivileged application.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker with physical access to a device may be able to determine characteristics of a user's passw ...

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.1 or Apple Mac OS 12 before 12.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause arbitrary code execution.


Pages:      Start    1137    1138    1139    1140    1141    1142    1143    1144    1145    1146    1147    1148    1149    1150    ..   1702

© SecPod Technologies