Vulnerabilities > Apple
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-06-09 | CVE-2020-9792 | Improper Input Validation vulnerability in Apple mac OS X A validation issue was addressed with improved input sanitization. | 4.6 |
2020-06-09 | CVE-2020-3882 | Information Exposure vulnerability in Apple mac OS X This issue was addressed with improved checks. | 4.3 |
2020-06-05 | CVE-2020-9859 | Double Free vulnerability in Apple products A memory consumption issue was addressed with improved memory handling. | 7.8 |
2020-05-28 | CVE-2019-20807 | OS Command Injection vulnerability in multiple products In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua). | 4.6 |
2020-05-27 | CVE-2020-13631 | SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. | 5.5 |
2020-05-27 | CVE-2020-13630 | Use After Free vulnerability in multiple products ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. | 7.0 |
2020-05-24 | CVE-2020-13434 | Integer Overflow or Wraparound vulnerability in multiple products SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. | 5.5 |
2020-05-11 | CVE-2020-9840 | Unspecified vulnerability in Apple Nioextras In SwiftNIO Extras before 1.4.1, a logic issue was addressed with improved restrictions. | 5.0 |
2020-05-08 | CVE-2020-6616 | Some Broadcom chips mishandle Bluetooth random-number generation because a low-entropy Pseudo Random Number Generator (PRNG) is used in situations where a Hardware Random Number Generator (HRNG) should have been used to prevent spoofing. | 6.5 |
2020-04-28 | CVE-2020-10663 | Improper Input Validation vulnerability in multiple products The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. | 7.5 |