[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195421 Download | Alert*

The host is missing a critical security update for KB5025277

The host is missing a critical security update for KB5025279

The host is missing a critical security update for KB5025285

The host is missing a critical security update for KB5025287

The host is missing a critical security update for KB5025288

The host is installed with Apple Mac OS 11 before 11.7.3 or Apple Mac OS 12 before 12.6.3 and is prone to an access vulnerability. The flaws are present in the application which fails to properly handle issues in improved access restrictions. On successful exploitation, an app may be able to access mail folder attachments through a temporary directory used during compression.

The host is installed with Apple Mac OS 12 before 12.6.6 or Apple Mac OS 13 before 13.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in additional permissions checks. On successful exploitation, a sandboxed app may be able to observe system-wide network connections.

The host is installed with Apple Mac OS 11 before 11.7.7 or Apple Mac OS 12 before 12.6.6 and is prone to a security bypass vulnerability. A flaw is present in the application which fails to handle issues in entitlements. On successful exploitation, a sandboxed app may be able to collect system logs.

The host is installed with Apple Mac OS 11 before 11.7.7, Apple Mac OS 12 before 12.6.6 or Apple Mac OS 13 before 13.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in redaction of sensitive information. On successful exploitation, an app may be able to bypass privacy preferences.

The host is installed with Apple Mac OS 11 before 11.7.7, Apple Mac OS 12 before 12.6.6 or Apple Mac OS 13 before 13.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, an app may bypass gatekeeper checks.


Pages:      Start    7724    7725    7726    7727    7728    7729    7730    7731    7732    7733    7734    7735    7736    7737    ..   19542

© SecPod Technologies