Page 37 of 1256 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. El problema se solucionó mejorando el manejo de los cachés. • https://support.apple.com/en-us/HT213599 https://support.apple.com/en-us/HT213601 https://support.apple.com/en-us/HT213605 https://support.apple.com/en-us/HT213606 https://support.apple.com/en-us/HT213842 https://support.apple.com/en-us/HT213844 https://support.apple.com/en-us/HT213845 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

This issue was addressed with improved state management of S/MIME encrypted emails. This issue is fixed in macOS Monterey 12.6.8. A S/MIME encrypted email may be inadvertently sent unencrypted. Este problema se solucionó mejorando la gestión del estado de los correos electrónicos cifrados S/MIME. Este problema se solucionó en macOS Monterey 12.6.8. • https://blog.aegrel.ee/apple-mail-smime.html https://support.apple.com/en-us/HT213844 •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 4

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Se solucionó un problema de Desbordamiento de Búfer de manejo de la memoria mejorada. • https://github.com/alsaeroth/CVE-2023-41064-POC https://github.com/MrR0b0t19/CVE-2023-41064 https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064 https://github.com/sarsaeroth/CVE-2023-41064-POC http://www.openwall.com/lists/oss-security/2023/09/21/4 https://support.apple.com/en-us/HT213905 https://support.apple.com/en-us/HT213906 https://support.apple.com/en-us/HT213913 https://support.apple.com/en-us/HT213914 https://support.apple.com/en-us/HT213915 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 3.3EPSS: 0%CPEs: 6EXPL: 0

This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.5. An app may be able to determine a user’s current location. Este problema se solucionó mejorando la redacción de información sensible. Este problema se solucionó en macOS Ventura 13.5. • https://support.apple.com/en-us/HT213843 https://support.apple.com/kb/HT213841 https://support.apple.com/kb/HT213842 https://support.apple.com/kb/HT213844 •

CVSS: 3.3EPSS: 0%CPEs: 8EXPL: 0

A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.5. An app may be able to read sensitive location information. Se solucionó un problema de privacidad mejorando la redacción de datos privados para las entradas de registro. Este problema se solucionó en macOS Ventura 13.5. • https://support.apple.com/en-us/HT213843 https://support.apple.com/kb/HT213841 https://support.apple.com/kb/HT213842 https://support.apple.com/kb/HT213844 https://support.apple.com/kb/HT213845 • CWE-532: Insertion of Sensitive Information into Log File •