[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17029 Download | Alert*

The host is installed with Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle a memory management issue. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code execution.

The host is installed with Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a logic issue. On successful exploitation, a malicious application may be able to leak sensitive user information.

The host is installed with Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a logic issue. On successful exploitation, processing maliciously crafted web content may lead to universal cross site scripting.

The host is installed with Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to handle an input validation issue. On successful exploitation, a remote attacker may be able to cause a denial of service.

The host is installed with Apple Mac OS before 11.4 or Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to handle an input validation issue. On successful exploitation, a remote attacker may be able to cause a denial of service.

The host is installed with Apple Safari before 15.0 on MacOS or Apple Mac OS 12 before 12.0.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a state management issue. On successful exploitation, a malicious application may bypass Gatekeeper checks.

The host is installed with Apple Safari before 15.0 on MacOS or Apple Mac OS 12 before 12.0.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a logic issue. On successful exploitation, an attacker in a privileged network position may be able to bypass HSTS.

The host is installed with Apple Safari before 6.0.1 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle quarantine attribute in HTML documents. Successful exploitation could allow user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.

The host is installed with Apple Safari before 6.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow remote attackers to obtain the Me card from an Address Book.

The host is installed with Apple Safari before 6.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle https urls. Successful exploitation could allow user-assisted remote attackers to obtain sensitive information by sniffing the network.


Pages:      Start    971    972    973    974    975    976    977    978    979    980    981    982    983    984    ..   1702

© SecPod Technologies