Page 139 of 1052 results (0.010 seconds)

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, iOS 15.2 and iPadOS 15.2, watchOS 8.3. An application may be able to access a user's files. Se abordó un problema de acceso con restricciones adicionales del sandbox. Este problema es corregido en macOS Big Sur versión 11.6.2, tvOS versión 15.2, macOS Monterey versión 12.1, iOS versión 15.2 e iPadOS versión 15.2, watchOS versión 8.3. • https://support.apple.com/en-us/HT212975 https://support.apple.com/en-us/HT212976 https://support.apple.com/en-us/HT212978 https://support.apple.com/en-us/HT212979 https://support.apple.com/en-us/HT212980 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2, macOS Big Sur 11.6.2. A malicious application may be able to bypass certain Privacy preferences. Se abordó un problema de lógica con restricciones mejoradas. Este problema es corregido en macOS Monterey versión 12.1, watchOS versión 8.3, iOS versión 15.2 e iPadOS versión 15.2, macOS Big Sur versión 11.6.2. • https://support.apple.com/en-us/HT212975 https://support.apple.com/en-us/HT212976 https://support.apple.com/en-us/HT212978 https://support.apple.com/en-us/HT212979 https://support.apple.com/kb/HT213056 •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A local attacker may be able to elevate their privileges. Este problema es corregido con comprobaciones mejoradas. Este problema es corregido en macOS Big Sur versión 11.6.2, tvOS versión 15.2, macOS Monterey versión 12.1, Security Update 2021-008 Catalina, iOS versión 15.2 e iPadOS versión 15.2, watchOS versión 8.3. • https://support.apple.com/en-us/HT212975 https://support.apple.com/en-us/HT212976 https://support.apple.com/en-us/HT212978 https://support.apple.com/en-us/HT212979 https://support.apple.com/en-us/HT212980 https://support.apple.com/en-us/HT212981 •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

Description: A memory corruption issue in the processing of ICC profiles was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing a maliciously crafted image may lead to arbitrary code execution. Descripción: Se abordó un problema de corrupción de memoria en el procesamiento de perfiles ICC con una comprobación de entrada mejorada. Este problema es corregido en macOS Big Sur versión 11.6.2, tvOS versión 15.2, macOS Monterey versión 12.1, Security Update 2021-008 Catalina, iOS versión 15.2 e iPadOS versión 15.2, watchOS versión 8.3. • http://packetstormsecurity.com/files/165559/Apple-ColorSync-Out-Of-Bounds-Read.html https://support.apple.com/en-us/HT212975 https://support.apple.com/en-us/HT212976 https://support.apple.com/en-us/HT212978 https://support.apple.com/en-us/HT212979 https://support.apple.com/en-us/HT212980 https://support.apple.com/en-us/HT212981 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 14EXPL: 0

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.1, iOS 15.2 and iPadOS 15.2, macOS Big Sur 11.6.2, Security Update 2021-008 Catalina. Processing a maliciously crafted USD file may disclose memory contents. Se abordó un problema de desbordamiento del búfer con una administración de la memoria mejorada. Este problema es corregido en macOS Monterey versión 12.1, iOS versión 15.2 e iPadOS versión 15.2, macOS Big Sur versión 11.6.2, Security Update 2021-008 Catalina. • https://support.apple.com/en-us/HT212976 https://support.apple.com/en-us/HT212978 https://support.apple.com/en-us/HT212979 https://support.apple.com/en-us/HT212981 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •