Page 47 of 572 results (0.018 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13. An app may be able to cause a denial-of-service to Endpoint Security clients. Se ha solucionado un problema lógico mejorando la gestión de estados. Este problema se ha solucionado en macOS Ventura 13. • https://support.apple.com/en-us/HT213488 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13. An app may be able to modify protected parts of the file system. Se ha solucionado un problema lógico con comprobaciones mejoradas. Este problema se ha solucionado en macOS Ventura 13. • https://support.apple.com/en-us/HT213488 •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. Processing a maliciously crafted AppleScript binary may result in unexpected app termination or disclosure of process memory. Se ha solucionado un problema mejorando la gestión de la memoria. Este problema se ha corregido en macOS Ventura 13.3. • https://support.apple.com/en-us/HT213670 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3. Processing an image may result in disclosure of process memory. Se ha solucionado un problema de lectura fuera de los límites mejorando la validación de las entradas. Este problema se ha solucionado en macOS Ventura 13.3. • https://support.apple.com/en-us/HT213670 • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WebKit PDF plugin. • https://support.apple.com/en-us/HT213670 https://support.apple.com/en-us/HT213676 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •