[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17560 Download | Alert*

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to a memory initialization vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to gain root privileges.

The host is installed with Apple Mac OS before 11.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation,Mounting a maliciously crafted Samba network share may lead to arbitrary code execution.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to a screen capture vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, an app may be able to capture a user's screen.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an This vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to access restricted files.

The host is installed with Apple Mac OS before 11.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may disclose restricted memory.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an This vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to bypass Privacy preferences.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code execution.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an This vulnerability. A flaw is present in the application, which fails to properly handle issues in improved environment sanitization. On successful exploitation, a malicious application may be able to break out of its sandbox.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, an application may be able to execute arbitrary code with kernel privileges.


Pages:      Start    791    792    793    794    795    796    797    798    799    800    801    802    803    804    ..   1755

© SecPod Technologies