[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17290 Download | Alert*

The host is installed with Apple Mac OS 11 before 11.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a permissions logic issue. On successful exploitation, a malicious application may be able to bypass Privacy preferences.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to disclose kernel memory.

The host is installed with Apple Mac OS 12 before 12.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to track users through their IP address.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. On successful exploitation, Processing a maliciously crafted USD file may disclose memory contents.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11 before 11.6.2 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to disclose kernel memory.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 11 before 11.6.2 and is prone to a logic vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory handling issue. On successful exploitation, processing a maliciously crafted USD file may disclose memory content.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a locking issue. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a checks issue. On successful exploitation, a local user may be able to cause unexpected system termination or read kernel memory.

The host is installed with Apple Mac OS X 10.15.7, Apple Mac OS 11 before 11.6.2 or Apple Mac OS 12 before 12.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.


Pages:      Start    1167    1168    1169    1170    1171    1172    1173    1174    1175    1176    1177    1178    1179    1180    ..   1728

© SecPod Technologies