Page 93 of 5616 results (0.008 seconds)

CVSS: 7.5EPSS: 1%CPEs: 23EXPL: 0

A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability. Se encontró un fallo en OpenLDAP. Este fallo permite a un atacante que puede enviar un paquete malicioso a ser procesado por el servidor slapd de OpenLDAP, para desencadenar un fallo de aserción. • http://seclists.org/fulldisclosure/2021/Feb/14 https://bugzilla.redhat.com/show_bug.cgi?id=1899675 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html https://security.netapp.com/advisory/ntap-20210716-0003 https://support.apple.com/kb/HT212147 https:// • CWE-617: Reachable Assertion •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

The issue was addressed with improved deletion. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, iOS 14.0 and iPadOS 14.0. A local user may be able to discover a user’s deleted messages. Se abordó un problema con una eliminación mejorada. Este problema se corrigió en macOS Big Sur versión 11.0.1, watchOS versión 7.0, iOS versión 14.0 y iPadOS versión 14.0. • http://seclists.org/fulldisclosure/2020/Dec/32 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. A local user may be able to view senstive user information. Se abordó un problema de acceso con restricciones del sandbox adicionales. Este problema se corrigió en macOS Big Sur versión 11.0.1, watchOS versión 7.0, tvOS versión 14.0, iOS versión 14.0 y iPadOS versión 14.0. • http://seclists.org/fulldisclosure/2020/Dec/32 https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges. Se abordó una lectura fuera de límites con una comprobación de entrada mejorada. Este problema se corrigió en macOS Big Sur versión 11.0.1, watchOS versión 7.0, tvOS versión 14.0, iOS versión 14.0 y iPadOS versión 14.0. • http://seclists.org/fulldisclosure/2020/Dec/32 https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211931 • CWE-125: Out-of-bounds Read •

CVSS: 9.3EPSS: 0%CPEs: 7EXPL: 0

A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. Processing a maliciously crafted file may lead to arbitrary code execution. Se abordó un uso de la memoria previamente liberada con una administración de la memoria mejorada. Este problema se corrigió en watchOS versión 7.0, iOS versión 14.0 e iPadOS versión 14.0, iTunes para Windows versión 12.10.9, iCloud para Windows versión 11.5, tvOS versión 14.0, macOS Catalina versión 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. • https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211849 https://support.apple.com/en-us/HT211850 https://support.apple.com/en-us/HT211935 https://support.apple.com/en-us/HT211952 • CWE-416: Use After Free •