![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.817821 |
Kategorie: | Mac OS X Local Security Checks |
Titel: | Apple Mac OS X Security Update (HT211947) |
Zusammenfassung: | Apple Mac OS X is prone to multiple vulnerabilities. |
Beschreibung: | Summary: Apple Mac OS X is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - A memory initialization issue. - A type confusion issue related to improper state handling. - A memory corruption issue related to improper input validation. Vulnerability Impact: Successful exploitation allow attackers to execute arbitrary code and disclose sensitive information. Affected Software/OS: Apple Mac OS X versions 10.15.7 prior to 10.15.7 build 19H15 Solution: Update to Apple Mac OS X 10.15.7 build 19H15or later. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-27950 http://seclists.org/fulldisclosure/2020/Dec/32 http://packetstormsecurity.com/files/161296/XNU-Kernel-Mach-Message-Trailers-Memory-Disclosure.html https://support.apple.com/en-us/HT211928 https://support.apple.com/en-us/HT211929 https://support.apple.com/en-us/HT211931 https://support.apple.com/en-us/HT211940 https://support.apple.com/en-us/HT211944 https://support.apple.com/en-us/HT211945 https://support.apple.com/en-us/HT211946 https://support.apple.com/en-us/HT211947 Common Vulnerability Exposure (CVE) ID: CVE-2020-27932 http://packetstormsecurity.com/files/161295/XNU-Kernel-Turnstiles-Type-Confusion.html Common Vulnerability Exposure (CVE) ID: CVE-2020-27930 http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |