Page 23 of 740 results (0.013 seconds)

CVSS: 7.8EPSS: 0%CPEs: 47EXPL: 0

23 Jul 2021 — A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing a maliciously crafted image may lead to a denial of service. Se abordó un problema lógico con una comprobación mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. • https://support.apple.com/en-us/HT212600 •

CVSS: 9.3EPSS: 0%CPEs: 31EXPL: 1

23 Jul 2021 — Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution. Se abordaron múltiples problemas de corrupción de la memoria con una administración de memoria mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, Security Update 2021-004 Catalina y Security Updat... • https://packetstorm.news/files/id/163886 • CWE-20: Improper Input Validation CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 1%CPEs: 31EXPL: 0

23 Jul 2021 — A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. An application may be able to execute arbitrary code with kernel privileges. Se abordó un problema de corrupción de la memoria con una comprobación de entrada mejorada. Este problema se corrigió en macOS Big Sur versión 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. • https://support.apple.com/en-us/HT212600 • CWE-787: Out-of-bounds Write •

CVSS: 5.3EPSS: 0%CPEs: 45EXPL: 1

22 Jul 2021 — curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly when... • http://seclists.org/fulldisclosure/2021/Sep/39 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-908: Use of Uninitialized Resource •

CVSS: 5.5EPSS: 0%CPEs: 30EXPL: 0

26 May 2021 — A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A malicious application may bypass Gatekeeper checks. Se abordó un problema lógico con una administración de estado mejorada. Este problema es corregido en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. • https://support.apple.com/en-us/HT212529 • CWE-494: Download of Code Without Integrity Check •

CVSS: 4.3EPSS: 0%CPEs: 10EXPL: 0

26 May 2021 — A validation issue was addressed with improved logic. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina. A malicious application may be able to send unauthorized Apple events to Finder. Se abordó un problema de comprobación con una lógica mejorada. Este problema es corregido en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina. • https://support.apple.com/en-us/HT212529 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

26 May 2021 — An access issue was addressed with improved access restrictions. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina. A malicious application may be able to access a user's call history. Se abordó un problema de acceso con restricciones de acceso mejorado. Este problema es corregido en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina. • https://support.apple.com/en-us/HT212529 •

CVSS: 7.1EPSS: 0%CPEs: 30EXPL: 0

26 May 2021 — A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A local user may be able to cause unexpected system termination or read kernel memory. Se abordó un problema lógico con una administración de estado mejorada. Este problema es corregido en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. • https://support.apple.com/en-us/HT212529 •

CVSS: 8.8EPSS: 0%CPEs: 36EXPL: 0

26 May 2021 — This issue was addressed with improved environment sanitization. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to break out of its sandbox. Se abordó este problema con un saneamiento del entorno mejorado. Este problema es corregido en tvOS versión 14.6, iOS versión 14.6 y iPadOS versión 14.6, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave,... • https://support.apple.com/en-us/HT212528 •

CVSS: 9.8EPSS: 2%CPEs: 30EXPL: 0

26 May 2021 — A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. Se abordó un problema lógico con una administración de estado mejorada. Este problema es corregido en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. • https://support.apple.com/en-us/HT212529 •