Page 93 of 1421 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted font file may lead to arbitrary code execution. Se abordó una lectura fuera de límites con una comprobación de entrada mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7, Security Update 2021-004 Catalina. • https://support.apple.com/en-us/HT212600 https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 • CWE-125: Out-of-bounds Read •

CVSS: 9.3EPSS: 0%CPEs: 14EXPL: 0

A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. A malicious application may be able to gain root privileges. Se abordó un problema lógico con una comprobación mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7. • https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 https://support.apple.com/kb/HT212600 •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted image may lead to arbitrary code execution. Se abordó un desbordamiento de búfer con una comprobación de límites mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7, Security Update 2021-004 Catalina. • https://support.apple.com/en-us/HT212600 https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 https://www.zerodayinitiative.com/advisories/ZDI-22-353 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.1EPSS: 0%CPEs: 35EXPL: 0

This issue was addressed with improved checks. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. Processing a maliciously crafted tiff file may lead to a denial-of-service or potentially disclose memory contents. Este problema se corrigió con comprobaciones mejoradas. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. • https://support.apple.com/en-us/HT212600 https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/en-us/HT212603 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations. Se abordó un problema lógico con una comprobación mejorada. Este problema se corrigió en iOS versión 14.7, tvOS versión 14.7 y watchOS versión 7.6. • https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 • CWE-287: Improper Authentication •