Vulnerabilities > Apple > Macos > 12.2.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-10 | CVE-2022-0158 | vim is vulnerable to Heap-based Buffer Overflow | 3.3 |
2021-12-31 | CVE-2021-4193 | vim is vulnerable to Out-of-bounds Read | 5.5 |
2021-12-31 | CVE-2021-4192 | vim is vulnerable to Use After Free | 7.8 |
2021-12-29 | CVE-2021-4187 | vim is vulnerable to Use After Free | 7.8 |
2021-12-27 | CVE-2021-4173 | vim is vulnerable to Use After Free | 7.8 |
2021-12-25 | CVE-2021-4166 | vim is vulnerable to Out-of-bounds Read | 7.1 |
2021-12-20 | CVE-2021-44224 | NULL Pointer Dereference vulnerability in multiple products A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). | 8.2 |
2021-12-20 | CVE-2021-44790 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). | 9.8 |
2021-12-19 | CVE-2021-4136 | vim is vulnerable to Heap-based Buffer Overflow | 7.8 |
2021-09-29 | CVE-2021-22946 | Cleartext Transmission of Sensitive Information vulnerability in multiple products A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). | 7.5 |