Page 22 of 3193 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 23EXPL: 0

02 Feb 2021 — This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. Este problema es abordado con comprobaciones mejoradas. Este problema es corregido en macOS Big Sur versión 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS versión 7.3, tvOS versión 14.4, ... • https://support.apple.com/en-us/HT212146 •

CVSS: 5.5EPSS: 0%CPEs: 22EXPL: 0

02 Feb 2021 — An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, watchOS 7.2. A remote attacker may be able to leak memory. Se abordó una lectura fuera de límites con una comprobación de límites mejorada. Este problema es corregido en macOS Big Sur versión 11.2, Securi... • https://support.apple.com/en-us/HT212003 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 0

02 Feb 2021 — This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted file may lead to heap corruption. Este problema es abordado con comprobaciones mejoradas. Este problema se solucionó en macOS Big Sur versión 11.2, Security Update 2021-001 Catalina, Security Upda... • https://support.apple.com/en-us/HT212003 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 17EXPL: 0

02 Feb 2021 — An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. An attacker in a privileged network position may be able to bypass authentication policy. Se abordó un problema de autenticación con una administración de estado mejorada. Este problema es corregido en macOS Big Sur versión 11.2, Security... • https://support.apple.com/en-us/HT212011 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

02 Feb 2021 — A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.0.1. A malicious application may be able to access private information. Se abordó un problema de lógica con una administración de estado mejorada. Este problema es corregido en macOS Big Sur versión 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur versión 11.0.1. • https://support.apple.com/en-us/HT211931 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

02 Feb 2021 — A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to elevate privileges. Se abordó un problema de lógica con una administración de estado mejorada. Este problema es corregido en macOS Big Sur versión 11.2, Security Update 2021-001 Catalina, Security Update 2021-... • https://support.apple.com/en-us/HT212011 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 18EXPL: 0

02 Feb 2021 — An integer overflow was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.0.1. Processing maliciously crafted web content may lead to arbitrary code execution. Se solucionó un desbordamiento de enteros con una comprobación de la entrada mejorada. Este problema es corregido en macOS Big Sur versión 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur ... • https://support.apple.com/en-us/HT211931 • CWE-190: Integer Overflow or Wraparound •

CVSS: 9.8EPSS: 6%CPEs: 23EXPL: 2

27 Jan 2021 — A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited.. Se abordó una condición de carrera con un bloqueo mejorado. • https://github.com/synacktiv/CVE-2021-1782 • CWE-667: Improper Locking •

CVSS: 7.5EPSS: 47%CPEs: 22EXPL: 0

25 Jan 2021 — An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck). Se detectó un subdesbordamiento de enteros en OpenLDAP versiones anteriores a 2.4.57, conllevando bloqueos de slapd en el procesamiento de Certificate Exact Assertion, resultando en una denegación de servicio (serialNumberAndIssuerCheck de schema_init.c) It was discovered that OpenLDAP incorrectly hand... • http://seclists.org/fulldisclosure/2021/May/64 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 7.5EPSS: 29%CPEs: 22EXPL: 0

25 Jan 2021 — A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service. Se detectó un fallo en OpenLDAP versiones anteriores a 2.4.57, conllevando a un fallo de aserción en slapd en la comprobación de saslAuthzTo, resultando en una denegación de servicio Several vulnerabilities were discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of... • http://seclists.org/fulldisclosure/2021/May/64 • CWE-617: Reachable Assertion •