VUMETRIC
CYBER PORTAL
Dashboard
Security News
Latest Vulnerabilities
Browse Vulnerabilities
by Vendors
by Products
by Categories
Weekly Reports
Vulnerabilities
>
Apple
>
Macos
> High
Exclude new CVEs:
DATE
CVE
VULNERABILITY TITLE
RISK
2020-10-27
CVE-2020-9941
Unspecified vulnerability in Apple products
This issue was addressed with improved checks.
network
low complexity
apple
7.5
7.5
2020-10-22
CVE-2020-9883
Classic Buffer Overflow vulnerability in Apple products
A buffer overflow issue was addressed with improved memory handling.
local
low complexity
apple
CWE-120
7.8
7.8
2020-10-22
CVE-2020-9876
Out-of-bounds Write vulnerability in Apple products
An out-of-bounds write issue was addressed with improved bounds checking.
local
low complexity
apple
CWE-787
7.8
7.8
2020-06-15
CVE-2019-20838
Out-of-bounds Read vulnerability in multiple products
libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.
network
low complexity
pcre
apple
splunk
CWE-125
7.5
7.5
2020-05-27
CVE-2020-13630
Use After Free vulnerability in multiple products
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
local
high complexity
sqlite
fedoraproject
canonical
netapp
brocade
debian
siemens
apple
oracle
CWE-416
7.0
7.0
2020-04-28
CVE-2020-10663
Improper Input Validation vulnerability in multiple products
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability.
network
low complexity
json-project
fedoraproject
opensuse
debian
apple
CWE-20
7.5
7.5
2019-12-11
CVE-2019-14899
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream.
low complexity
freebsd
linux
openbsd
apple
7.4
7.4
«
Previous
1
2
...
81
82
83
84
85
(current)
»