Page 98 of 1257 results (0.014 seconds)

CVSS: 7.1EPSS: 0%CPEs: 35EXPL: 0

23 Jul 2021 — This issue was addressed with improved checks. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. Processing a maliciously crafted tiff file may lead to a denial-of-service or potentially disclose memory contents. Este problema se corrigió con comprobaciones mejoradas. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7, Security Update 2021-005 Mojave, ... • https://support.apple.com/en-us/HT212600 •

CVSS: 7.8EPSS: 0%CPEs: 32EXPL: 0

23 Jul 2021 — An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution. Se abordó un problema de divulgación de información al eliminar el código vulnerable. Este problema se corrigió en macOS Big Sur versión 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. • https://support.apple.com/en-us/HT212600 •

CVSS: 5.3EPSS: 0%CPEs: 45EXPL: 1

22 Jul 2021 — curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly when... • http://seclists.org/fulldisclosure/2021/Sep/39 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-908: Use of Uninitialized Resource •

CVSS: 6.5EPSS: 0%CPEs: 9EXPL: 0

20 Jul 2021 — libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block). libarchive versiones 3.4.1 hasta 3.5.1, presenta un uso de memoria previamente liberada en la función copy_string (llamado desde do_uncompress_block y process_block) It was discovered that libarchive incorrectly handled symlinks. If a user or automated system were tricked into processing a specially crafted archive, an attacker could possibly use this issue to change modes, times, ACLs, an... • http://seclists.org/fulldisclosure/2022/Mar/27 • CWE-416: Use After Free •

CVSS: 9.3EPSS: 0%CPEs: 30EXPL: 0

26 May 2021 — A malicious application may be able to execute arbitrary code with kernel privileges. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. An out-of-bounds write issue was addressed with improved bounds checking. Una aplicación maliciosa puede ser capaz de ejecutar código arbitrario con privilegios del kernel. Este problema se corrigió en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina y Security Update 2021-004 Mojave. • https://support.apple.com/en-us/HT212529 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

26 May 2021 — A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina. A remote attacker may cause an unexpected application termination or arbitrary code execution. Se abordó un problema lógico con una administración de estado mejorada. Este problema es corregido en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina. • https://support.apple.com/en-us/HT212529 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

26 May 2021 — A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, tvOS 14.6, watchOS 7.5, iOS 14.6 and iPadOS 14.6. A malicious application may be able to modify protected parts of the file system. Se abordó un problema lógico con una administración de estado mejorada. Este problema se corrigió en macOS Big Sur versión 11.4, tvOS versión 14.6, watchOS versión 7.5, iOS versión 14.6 e iPadOS versión 14.6. • https://support.apple.com/en-us/HT212528 •

CVSS: 5.5EPSS: 0%CPEs: 32EXPL: 0

26 May 2021 — An information disclosure issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6. Processing a maliciously crafted USD file may disclose memory contents. Se abordó un problema de divulgación de información con una administración de estado mejorada. Este problema es corregido en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave, iOS ... • https://support.apple.com/en-us/HT212528 •

CVSS: 7.8EPSS: 0%CPEs: 33EXPL: 0

26 May 2021 — This issue was addressed with improved checks. This issue is fixed in tvOS 14.6, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. A local attacker may be able to elevate their privileges. Este problema se abordó con comprobaciones mejoradas. Este problema se corrigió en tvOS versión 14.6, Security Update 2021-004 Mojave, iOS versión 14.6 e iPadOS versión 14.6, Security Update 2021-003 Catalina, macOS Big Sur versión 11.4, watchOS ... • https://support.apple.com/en-us/HT212528 •

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

26 May 2021 — A local user may be able to cause unexpected system termination or read kernel memory. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina. An out-of-bounds read issue was addressed by removing the vulnerable code. Un usuario local puede causar la terminación inesperada del sistema o leer la memoria del kernel. Este problema es corregido en macOS Big Sur versión 11.4, Security Update 2021-003 Catalina. • https://support.apple.com/en-us/HT212529 • CWE-125: Out-of-bounds Read •