Show filters
388 Total Results
Displaying 291-300 of 388
Sort by:
Attacker Value
Unknown
CVE-2021-30912
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
The issue was addressed with improved permissions logic. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may gain access to a user's Keychain items.
0
Attacker Value
Unknown
CVE-2021-30909
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges.
0
Attacker Value
Unknown
CVE-2021-30903
Disclosure Date: August 24, 2021 (last updated November 08, 2023)
This issue was addressed with improved checks. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1. A local attacker may be able to cause unexpected application termination or arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-30901
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
Multiple out-of-bounds write issues were addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.
0
Attacker Value
Unknown
CVE-2021-30880
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.
0
Attacker Value
Unknown
CVE-2021-30869
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 12.5.5, iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, Security Update 2021-006 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild.
0
Attacker Value
Unknown
CVE-2021-30860
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
0
Attacker Value
Unknown
CVE-2021-30865
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.6, Security Update 2021-005 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges.
0
Attacker Value
Unknown
CVE-2021-22925
Disclosure Date: August 05, 2021 (last updated February 23, 2025)
curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
0
Attacker Value
Unknown
CVE-2020-25709
Disclosure Date: May 18, 2021 (last updated February 22, 2025)
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
0