[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Apple Mac OS 11 before 11.6.6 or Apple Mac OS 12 before 12.4 and is prone to an The vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to bypass Privacy preferences.

The host is installed with Apple Mac OS before 11.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS before 11.6.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an attacker may be able to cause unexpected application termination or arbitrary code execution.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to gain root privileges.

The host is installed with Apple Mac OS 12 before 12.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, an attacker may be able to cause unexpected application termination or arbitrary code execution.

The host is installed with Apple Mac OS 12 before 12.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a issues in memory handling. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS 12 before 12.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a issues in memory handling. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS 12 before 12.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a issues in memory handling. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.


Pages:      Start    8168    8169    8170    8171    8172    8173    8174    8175    8176    8177    8178    8179    8180    8181    ..   19630

© SecPod Technologies