Vulnerabilities > Apple > MAC OS X > 10.11.6
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-02-27 | CVE-2020-3829 | Out-of-bounds Read vulnerability in Apple products An out-of-bounds read was addressed with improved bounds checking. | 9.3 |
2020-02-27 | CVE-2020-3827 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X A memory corruption issue was addressed with improved input validation. | 9.3 |
2020-02-27 | CVE-2020-3826 | Out-of-bounds Read vulnerability in Apple products An out-of-bounds read was addressed with improved input validation. | 6.8 |
2020-02-24 | CVE-2019-20044 | Improper Check for Dropped Privileges vulnerability in multiple products In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. | 7.8 |
2020-02-05 | CVE-2019-15126 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in multiple products An issue was discovered on Broadcom Wi-Fi client devices. | 2.9 |
2020-02-03 | CVE-2016-4676 | Information Exposure vulnerability in Apple mac OS X and Safari A Cross-origin vulnerability exists in WebKit in Apple Safari before 10.0.1 when processing location attributes, which could let a remote malicious user obtain sensitive information. | 5.0 |
2019-12-19 | CVE-2019-19906 | Off-by-one Error vulnerability in multiple products cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. | 7.5 |
2019-12-18 | CVE-2019-8817 | Improper Input Validation vulnerability in Apple mac OS X A validation issue was addressed with improved input sanitization. | 4.3 |
2019-12-18 | CVE-2019-8807 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X A memory corruption issue was addressed with improved memory handling. | 9.3 |
2019-12-18 | CVE-2019-8805 | Improper Input Validation vulnerability in Apple mac OS X A validation issue existed in the entitlement verification. | 9.3 |