Vulnerabilities > Apple > Macos > 1.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-24 | CVE-2022-32811 | Improper Locking vulnerability in Apple mac OS X and Macos A memory corruption vulnerability was addressed with improved locking. | 7.8 |
2022-08-24 | CVE-2022-32812 | Unspecified vulnerability in Apple mac OS X and Macos The issue was addressed with improved memory handling. | 7.8 |
2022-08-24 | CVE-2022-32813 | Unspecified vulnerability in Apple products The issue was addressed with improved memory handling. | 7.8 |
2022-08-24 | CVE-2022-32834 | Unspecified vulnerability in Apple mac OS X and Macos An access issue was addressed with improvements to the sandbox. | 5.5 |
2022-08-24 | CVE-2022-32838 | Unspecified vulnerability in Apple products A logic issue was addressed with improved state management. | 5.5 |
2022-08-24 | CVE-2022-32839 | Unspecified vulnerability in Apple products The issue was addressed with improved bounds checks. | 9.8 |
2022-08-24 | CVE-2022-32857 | Unspecified vulnerability in Apple products This issue was addressed by using HTTPS when sending information over the network. low complexity apple | 4.3 |
2022-07-28 | CVE-2022-2294 | Out-of-bounds Write vulnerability in multiple products Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-07 | CVE-2022-32205 | Allocation of Resources Without Limits or Throttling vulnerability in multiple products A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. | 4.3 |
2022-07-07 | CVE-2022-32207 | Incorrect Default Permissions vulnerability in multiple products When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended. | 9.8 |