Vulnerabilities > Apple > Macos > 14.2.1

DATE CVE VULNERABILITY TITLE RISK
2024-01-23 CVE-2024-23212 Unspecified vulnerability in Apple products
The issue was addressed with improved memory handling.
local
low complexity
apple
7.8
2024-01-23 CVE-2024-23213 Unspecified vulnerability in Apple products
The issue was addressed with improved memory handling.
network
low complexity
apple
8.8
2024-01-23 CVE-2024-23214 Out-of-bounds Write vulnerability in Apple Ipados, Iphone OS and Macos
Multiple memory corruption issues were addressed with improved memory handling.
network
low complexity
apple CWE-787
8.8
2024-01-23 CVE-2024-23215 Unspecified vulnerability in Apple products
An issue was addressed with improved handling of temporary files.
local
low complexity
apple
5.5
2024-01-23 CVE-2024-23217 Unspecified vulnerability in Apple products
A privacy issue was addressed with improved handling of temporary files.
local
low complexity
apple
3.3
2024-01-23 CVE-2024-23218 Information Exposure Through Discrepancy vulnerability in Apple products
A timing side-channel issue was addressed with improvements to constant-time computation in cryptographic functions.
network
high complexity
apple CWE-203
5.9
2024-01-23 CVE-2024-23222 Type Confusion vulnerability in Apple products
A type confusion issue was addressed with improved checks.
network
low complexity
apple CWE-843
8.8
2024-01-23 CVE-2024-23223 Unspecified vulnerability in Apple products
A privacy issue was addressed with improved handling of files.
local
low complexity
apple
6.2
2024-01-23 CVE-2024-23224 Unspecified vulnerability in Apple Macos
The issue was addressed with improved checks.
local
low complexity
apple
5.5
2023-12-18 CVE-2023-48795 Improper Validation of Integrity Check Value vulnerability in multiple products
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.
5.9