[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: macos
LiquidWorm
RoyalTSX 6.0.1 - RTSZ File Handling Heap Memory Corruption PoC
remote
macos
LiquidWorm
Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS)
local
macos
Jean Pereira
HospitalRun 1.0.0-beta - Local Root Exploit for macOS
local
macos
boku
macOS/x64 - Execve Caesar Cipher String Null-Free Shellcode
macos
286.0
boku
macOS/x64 - Execve Null-Free Shellcode
macos
253.0
LiquidWorm
Fetch Softworks Fetch FTP Client 5.8 - Remote CPU Consumption (Denial of Service)
local
macos
leonjza
Laravel Valet 2.0.3 - Local Privilege Escalation (macOS)
local
macos
Captain_hook
Atlassian Jira Server Data Center 8.16.0 - Reflected Cross-Site Scripting (XSS)
webapps
macos
CVE-2021-26078
Csaba Fitzl
MacOS 320.whatis Script - Privilege Escalation
local
macos
0xEmma
Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution
local
macos
CVE-2020-12242
Metasploit
VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit)
local
macos
CVE-2020-3950
Metasploit
VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit)
local
macos
CVE-2020-3950
Rich Mirch
VMware Fusion 11.5.2 - Privilege Escalation
local
macos
CVE-2020-3950
Grimm
VMWare Fusion - Local Privilege Escalation
local
macos
Google Security Research
macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event()
dos
macos
Google Security Research
macOS 10.14.6 - root->kernel Privilege Escalation via update_dyld_shared_cache
local
macos
«
1
2
3
4
5
6
7
»
page: 1/7 [exploits: 104]