![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-3187
https://notcve.org/view.php?id=CVE-2021-3187
11 Dec 2023 — An issue was discovered in BeyondTrust Privilege Management for Mac before 5.7. An authenticated, unprivileged user can elevate privileges by running a malicious script (that executes as root from a temporary directory) during install time. (This applies to macOS before 10.15.5, or Security Update 2020-003 on Mojave and High Sierra, Later versions of macOS are not vulnerable.) Se descubrió un problema en BeyondTrust Privilege Management para Mac anterior a la versión 5.7. Un usuario autenticado y sin privil... • https://www.beyondtrust.com/docs/release-notes/privilege-management/index.htm •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-46706
https://notcve.org/view.php?id=CVE-2022-46706
14 Aug 2023 — A type confusion issue was addressed with improved state handling. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to execute arbitrary code with kernel privileges. Se ha solucionado un problema de confusión de tipos mejorando la gestión de estados. Este problema se ha corregido en la actualización de seguridad 2022-003 Catalina, macOS Monterey 12.3 y macOS Big Sur 11.6.5. • https://support.apple.com/en-us/HT213183 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-1763
https://notcve.org/view.php?id=CVE-2023-1763
17 May 2023 — Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the software. • https://psirt.canon/advisory-information/cp2023-002 • CWE-522: Insufficiently Protected Credentials CWE-549: Missing Password Field Masking •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-1764
https://notcve.org/view.php?id=CVE-2023-1764
17 May 2023 — Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the communication of the software. • https://psirt.canon/advisory-information/cp2023-002 • CWE-326: Inadequate Encryption Strength •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-27960
https://notcve.org/view.php?id=CVE-2023-27960
08 May 2023 — This issue was addressed by removing the vulnerable code. This issue is fixed in GarageBand for macOS 10.4.8. An app may be able to gain elevated privileges during the installation of GarageBand. • https://support.apple.com/en-us/HT213650 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-28143 – Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2023-28143
18 Apr 2023 — Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. During the install of the PKG, a step in the process involves extracting the package and copying files to several directories. Attackers may gain writable access to files during the install of P... • https://qualys.com/security-advisories • CWE-426: Untrusted Search Path •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-32794
https://notcve.org/view.php?id=CVE-2022-32794
01 Nov 2022 — A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. An app may be able to gain elevated privileges. Se abordó una cuestión de lógica con una mejor gestión estatal. Este problema se solucionó en la Actualización de seguridad 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. • https://support.apple.com/en-us/HT213255 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-32910
https://notcve.org/view.php?id=CVE-2022-32910
01 Nov 2022 — A logic issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.8, macOS Monterey 12.5, Security Update 2022-005 Catalina. An archive may be able to bypass Gatekeeper. Se solucionó un problema de lógica con controles mejorados. Este problema se solucionó en macOS Big Sur 11.6.8, macOS Monterey 12.5, Actualización de seguridad 2022-005 Catalina. • https://support.apple.com/en-us/HT213343 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-32790
https://notcve.org/view.php?id=CVE-2022-32790
23 Sep 2022 — This issue was addressed with improved checks. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, macOS Big Sur 11.6.6, Security Update 2022-004 Catalina. A remote user may be able to cause a denial-of-service. Se abordó este problema con comprobaciones mejoradas. Este problema ha sido corregido en tvOS versión 15.5, watchOS versión 8.6, iOS versión 15.5 y iPadOS versión 15.5, macOS Monterey versión 12.4, macOS Big Sur versión 11.6.6, Security Update 2022-004 Catal... • https://support.apple.com/en-us/HT213253 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-22630 – Apple macOS Remote Events Memory Corruption Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-22630
15 Aug 2022 — A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.6.6, macOS Monterey 12.3, Security Update 2022-004 Catalina. A remote user may cause an unexpected app termination or arbitrary code execution This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Authentication is not required to exploit this vulnerability. The specific flaw exists within Apple Remote Events. The issue results from the lack o... • https://packetstorm.news/files/id/168247 • CWE-416: Use After Free •