Page 21 of 1047 results (0.015 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

30 May 2023 — A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Ventura 13.4. An app may be able to bypass Privacy preferences. macOS Ventura 13.4 addresses buffer overflow, bypass, code execution, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT213758 • CWE-125: Out-of-bounds Read •

CVSS: 6.0EPSS: 0%CPEs: 3EXPL: 0

30 May 2023 — A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An app may be able to modify protected parts of the file system. macOS Monterey 12.6.6 addresses buffer overflow, bypass, code execution, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT213758 •

CVSS: 10.0EPSS: 0%CPEs: 13EXPL: 0

30 May 2023 — A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. A use after free vulnerability was found in the webkitgtk package. • https://security.gentoo.org/glsa/202401-04 • CWE-416: Use After Free •

CVSS: 9.1EPSS: 0%CPEs: 14EXPL: 1

26 May 2023 — A denial of service vulnerability exists in curl

CVSS: 9.1EPSS: 0%CPEs: 14EXPL: 1

26 May 2023 — A use after free vulnerability exists in curl

CVSS: 9.1EPSS: 0%CPEs: 17EXPL: 1

26 May 2023 — An improper certificate validation vulnerability exists in curl

CVSS: 3.7EPSS: 0%CPEs: 16EXPL: 1

26 May 2023 — An information disclosure vulnerability exists in curl

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

17 May 2023 — Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the software. • https://psirt.canon/advisory-information/cp2023-002 • CWE-522: Insufficiently Protected Credentials CWE-549: Missing Password Field Masking •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

17 May 2023 — Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the communication of the software. • https://psirt.canon/advisory-information/cp2023-002 • CWE-326: Inadequate Encryption Strength •

CVSS: 6.2EPSS: 0%CPEs: 2EXPL: 1

09 May 2023 — A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values. The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Issues addressed include buffer overflow, integer overflow, out of bounds read, and out of bounds write vulnerabilities. • http://seclists.org/fulldisclosure/2023/Oct/24 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •