Page 214 of 2179 results (0.038 seconds)

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

A logic issue was addressed with improved state management. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0. A malicious application may be able to leak sensitive user information. Se abordó un problema lógico con una administración de estado mejorada. Este problema es corregido en iOS versión 14.0 e iPadOS versión 14.0, tvOS 14.0, watchOS 7.0. • http://seclists.org/fulldisclosure/2020/Nov/19 http://seclists.org/fulldisclosure/2020/Nov/20 http://seclists.org/fulldisclosure/2020/Nov/22 https://support.apple.com/HT211843 https://support.apple.com/HT211844 https://support.apple.com/HT211850 •

CVSS: 9.3EPSS: 0%CPEs: 30EXPL: 0

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave, iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. Se abordó una lectura fuera de límites con una comprobación de límites mejorada. Este problema se corrigió en macOS Catalina versión 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave, iOS versión 14.0 y iPadOS versión 14.0. • http://seclists.org/fulldisclosure/2020/Nov/20 http://seclists.org/fulldisclosure/2020/Nov/21 https://support.apple.com/en-us/HT211849 https://support.apple.com/en-us/HT211850 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1104 • CWE-125: Out-of-bounds Read •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

This issue was addressed by encrypting communications over the network to devices running iOS 14, iPadOS 14, tvOS 14, and watchOS 7. This issue is fixed in iOS 14.0 and iPadOS 14.0, Xcode 12.0. An attacker in a privileged network position may be able to execute arbitrary code on a paired device during a debug session over the network. Este problema es corregido cifrando las comunicaciones a través de la red para los dispositivos que ejecutan iOS versión 14, iPadOS versión 14, tvOS versión 14 y watchOS versión 7. Este problema es corregido en iOS versión 14.0 e iPadOS versión 14.0, Xcode versión 12.0. • http://seclists.org/fulldisclosure/2020/Nov/20 https://support.apple.com/HT211848 https://support.apple.com/HT211850 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

A trust issue was addressed by removing a legacy API. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0. An attacker may be able to misuse a trust relationship to download malicious content. Se abordó un problema de confianza al eliminar una API legacy. Este problema se corrigió en iOS versión 14.0 y iPadOS versión 14.0, tvOS versión 14.0. • http://seclists.org/fulldisclosure/2020/Nov/19 http://seclists.org/fulldisclosure/2020/Nov/20 https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211850 •

CVSS: 5.5EPSS: 0%CPEs: 32EXPL: 0

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 14.0 and iPadOS 14.0, macOS Catalina 10.15.7, tvOS 14.0, watchOS 7.0. A malicious application may be able to access restricted files. Se abordó un problema lógico con una restricciones mejoradas. Este problema es corregido en iOS versión 14.0 e iPadOS versión 14.0, macOS Catalina versión 10.15.7, tvOS versión 14.0, watchOS versión 7.0. • http://seclists.org/fulldisclosure/2020/Nov/19 http://seclists.org/fulldisclosure/2020/Nov/20 http://seclists.org/fulldisclosure/2020/Nov/21 http://seclists.org/fulldisclosure/2020/Nov/22 https://support.apple.com/HT211843 https://support.apple.com/HT211844 https://support.apple.com/HT211849 https://support.apple.com/HT211850 •