[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118594

 
 

909

 
 

92444

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 9811 Download | Alert*

The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to elevate privileges through a malicious application.

The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to break out of its sandbox.

The host is installed with Apple Mac OS X 10.12.6 or 10.13.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory handling issue. Successful exploitation allows an attacker to execute arbitrary code with system privileges.

The host is installed with Apple Mac OS X 10.12.6 or 10.13.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation allows an attacker to elevate privileges through a malicious application.

The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to initiate a FaceTime call causing arbitrary code execution.

The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows an attacker to break out of its sandbox.

The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to read restricted memory.

The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to elevate privileges through a malicious application.

The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a bounds checking issue. Successful exploitation allows an attacker to elevate privileges through a malicious application.

The host is installed with Apple Mac OS X 10.13.6 or 10.14.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   981

© SecPod Technologies