[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17029 Download | Alert*

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. On successful exploitation, Processing a maliciously crafted USD file may disclose memory contents.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11 before 11.6.2 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to disclose kernel memory.

The host is installed with Apple Mac OS 11 before 11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11 before 11.6.2 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory handling issue. On successful exploitation, processing a maliciously crafted USD file may disclose memory content.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a locking issue. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. On successful exploitation, a local user may be able to cause unexpected system termination or read kernel memory.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory handling issue. On successful exploitation, processing a maliciously crafted USD file may disclose memory content.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.


Pages:      Start    1139    1140    1141    1142    1143    1144    1145    1146    1147    1148    1149    1150    1151    1152    ..   1702

© SecPod Technologies