Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.817904
Kategorie:Mac OS X Local Security Checks
Titel:Apple Mac OS X Security Updates (HT212147)-02
Zusammenfassung:Apple Mac OS X is prone to multiple vulnerabilities.
Beschreibung:Summary:
Apple Mac OS X is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- An improper port validation.

- An improper access restriction.

- An improper way of state handling.

- An improper memory management.

- An improper iframe sandbox enforcement.

- Multiple input validation errors.

- An improper bounds checking in multiple components.

Vulnerability Impact:
Successful exploitation will allow attackers
to cause arbitrary code execution, disclosure of sensitive information and
denial of service.

Affected Software/OS:
Apple Mac OS X versions 11.x through 11.0.1

Solution:
Upgrade to Apple Mac OS X 11.2 or later.
Please see the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-1797
http://seclists.org/fulldisclosure/2021/Apr/51
http://seclists.org/fulldisclosure/2021/Apr/54
https://support.apple.com/en-us/HT212146
https://support.apple.com/en-us/HT212147
https://support.apple.com/en-us/HT212148
https://support.apple.com/en-us/HT212149
Common Vulnerability Exposure (CVE) ID: CVE-2021-1760
Common Vulnerability Exposure (CVE) ID: CVE-2021-1747
Common Vulnerability Exposure (CVE) ID: CVE-2021-1799
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
https://security.gentoo.org/glsa/202104-03
https://support.apple.com/en-us/HT212152
Common Vulnerability Exposure (CVE) ID: CVE-2021-1759
Common Vulnerability Exposure (CVE) ID: CVE-2021-1791
Common Vulnerability Exposure (CVE) ID: CVE-2021-1783
Common Vulnerability Exposure (CVE) ID: CVE-2021-1741
Common Vulnerability Exposure (CVE) ID: CVE-2021-1743
Common Vulnerability Exposure (CVE) ID: CVE-2021-1773
Common Vulnerability Exposure (CVE) ID: CVE-2021-1778
Common Vulnerability Exposure (CVE) ID: CVE-2021-1779
Common Vulnerability Exposure (CVE) ID: CVE-2021-1757
Common Vulnerability Exposure (CVE) ID: CVE-2021-1764
Common Vulnerability Exposure (CVE) ID: CVE-2021-1762
Common Vulnerability Exposure (CVE) ID: CVE-2019-20838
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://www.pcre.org/original/changelog.txt
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2020-14155
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.oracle.com/security-alerts/cpuapr2022.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-1769
Common Vulnerability Exposure (CVE) ID: CVE-2021-1788
Debian Security Information: DSA-4923 (Google Search)
https://www.debian.org/security/2021/dsa-4923
Common Vulnerability Exposure (CVE) ID: CVE-2021-1765
Common Vulnerability Exposure (CVE) ID: CVE-2021-1801
Common Vulnerability Exposure (CVE) ID: CVE-2021-1789
Common Vulnerability Exposure (CVE) ID: CVE-2021-1871
Common Vulnerability Exposure (CVE) ID: CVE-2021-1870
Common Vulnerability Exposure (CVE) ID: CVE-2021-30869
https://support.apple.com/en-us/HT212824
https://support.apple.com/en-us/HT212825
Common Vulnerability Exposure (CVE) ID: CVE-2021-1781
CopyrightCopyright (C) 2021 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.