Vulnerabilities > Apple > Macos > 1.0

DATE CVE VULNERABILITY TITLE RISK
2022-08-24 CVE-2022-32811 Improper Locking vulnerability in Apple mac OS X and Macos
A memory corruption vulnerability was addressed with improved locking.
local
low complexity
apple CWE-667
7.8
2022-08-24 CVE-2022-32812 Unspecified vulnerability in Apple mac OS X and Macos
The issue was addressed with improved memory handling.
local
low complexity
apple
7.8
2022-08-24 CVE-2022-32813 Unspecified vulnerability in Apple products
The issue was addressed with improved memory handling.
local
low complexity
apple
7.8
2022-08-24 CVE-2022-32834 Unspecified vulnerability in Apple mac OS X and Macos
An access issue was addressed with improvements to the sandbox.
local
low complexity
apple
5.5
2022-08-24 CVE-2022-32838 Unspecified vulnerability in Apple products
A logic issue was addressed with improved state management.
local
low complexity
apple
5.5
2022-08-24 CVE-2022-32839 Unspecified vulnerability in Apple products
The issue was addressed with improved bounds checks.
network
low complexity
apple
critical
9.8
2022-08-24 CVE-2022-32857 Unspecified vulnerability in Apple products
This issue was addressed by using HTTPS when sending information over the network.
low complexity
apple
4.3
2022-07-28 CVE-2022-2294 Out-of-bounds Write vulnerability in multiple products
Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
8.8
2022-07-07 CVE-2022-32205 Allocation of Resources Without Limits or Throttling vulnerability in multiple products
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them.
4.3
2022-07-07 CVE-2022-32207 Incorrect Default Permissions vulnerability in multiple products
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.
network
low complexity
haxx fedoraproject debian netapp apple splunk CWE-276
critical
9.8