
CVE-2022-26776 – Apple Security Advisory 2022-05-16-2
https://notcve.org/view.php?id=CVE-2022-26776
17 May 2022 — Un atacante puede causar la terminación inesperada de la aplicación o una ejecución de código arbitrario macOS Monterey 12.4 addresses buffer overflow, bypass, code execution, denial of service, integer overflow, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT213256 •

CVE-2022-26703 – Apple Security Advisory 2022-05-16-1
https://notcve.org/view.php?id=CVE-2022-26703
17 May 2022 — Una persona con acceso físico a un dispositivo iOS podría acceder a las fotos desde la pantalla de bloqueo iOS 15.5 and iPadOS 15.5 addresses bypass, code execution, denial of service, integer overflow, out of bounds access, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT213258 •

CVE-2022-26704 – Apple Security Advisory 2022-05-16-2
https://notcve.org/view.php?id=CVE-2022-26704
17 May 2022 — Una aplicación puede ser capaz de alcanzar altos privilegios macOS Monterey 12.4 addresses buffer overflow, bypass, code execution, denial of service, integer overflow, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • http://seclists.org/fulldisclosure/2022/Jul/13 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2022-26706 – Apple Security Advisory 2022-05-16-1
https://notcve.org/view.php?id=CVE-2022-26706
17 May 2022 — Un proceso en sandbox puede ser capaz de omitir las restricciones de sandbox macOS Monterey 12.4 addresses buffer overflow, bypass, code execution, denial of service, integer overflow, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT213253 •

CVE-2022-26708 – Apple Security Advisory 2022-05-16-2
https://notcve.org/view.php?id=CVE-2022-26708
17 May 2022 — Un atacante puede causar la terminación inesperada de la aplicación o una ejecución de código arbitrario macOS Monterey 12.4 addresses buffer overflow, bypass, code execution, denial of service, integer overflow, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT213257 •

CVE-2022-26711 – Apple macOS ImageIO WebP File Parsing Integer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-26711
17 May 2022 — An integer overflow issue was addressed with improved input validation. ... The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before reading from memory. An attacker can leverage this vulnerability to execute code in the context of the current process. macOS Monterey 12.4 addresses buffer overflow, bypass, code execution, denial of service, integer overflow, out of bounds access, out of bounds read, o... • https://support.apple.com/en-us/HT213253 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-26712 – Apple Security Advisory 2022-05-16-2
https://notcve.org/view.php?id=CVE-2022-26712
17 May 2022 — Una aplicación maliciosa puede ser capaz de modificar partes protegidas del sistema de archivos macOS Monterey 12.4 addresses buffer overflow, bypass, code execution, denial of service, integer overflow, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT213256 •

CVE-2022-1728 – Allowing long password leads to denial of service in polonel/trudesk in polonel/trudesk
https://notcve.org/view.php?id=CVE-2022-1728
16 May 2022 — Allowing long password leads to denial of service in polonel/trudesk in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications. Permitiendo una contraseña larga conlleva a una denegación de servicio en polonel/trudesk en el repositorio de GitHub polonel/trudesk versiones anteriores a 1.2.2. Esta vulnerabilidad puede ser abusada al hacer un ataque DDoS por el cual usuarios genuinos no pod... • https://github.com/polonel/trudesk/commit/e836d04d16787c2c9c72e7bf011cf396d1f73c19 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-1718 – The trudesk application allows large characters to insert in the input field "Full Name" on the signup field which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request in polonel/trudesk
https://notcve.org/view.php?id=CVE-2022-1718
16 May 2022 — The trudesk application allows large characters to insert in the input field "Full Name" on the signup field which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request in GitHub repository polonel/trudesk prior to 1.2.2. This can lead to Denial of service. La aplicación trudesk permite insertar caracteres grandes en el campo de entrada "Full Name" en el campo de registro, lo que puede permitir a atacantes causar una Denegación de Servicio (DoS) por medio de una petición HTTP dis... • https://github.com/polonel/trudesk/commit/87e231e04495fb705fe1e03cb56fc4136bafe895 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-28937
https://notcve.org/view.php?id=CVE-2022-28937
15 May 2022 — FISCO-BCOS release-3.0.0-rc2 was discovered to contain an issue where a malicious node, via an invalid proposal with an invalid header, will cause normal nodes to stop producing new blocks and processing new clients' requests. Se ha detectado que FISCO-BCOS versión 3.0.0-rc2, contiene un problema por el que un nodo malicioso, por medio de una propuesta con un encabezado no válido, causará que los nodos normales dejen de producir nuevos bloques y de procesar las peticiones de los nuevos clientes • https://github.com/FISCO-BCOS/FISCO-BCOS/issues/2312 • CWE-190: Integer Overflow or Wraparound •