Vulnerabilities > Apple
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-10-03 | CVE-2018-14465 | Out-of-bounds Read vulnerability in multiple products The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print(). | 7.5 |
2019-10-03 | CVE-2018-14464 | Out-of-bounds Read vulnerability in multiple products The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs(). | 7.5 |
2019-10-03 | CVE-2018-14463 | Out-of-bounds Read vulnerability in multiple products The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167. | 7.5 |
2019-10-03 | CVE-2018-14462 | Out-of-bounds Read vulnerability in multiple products The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print(). | 7.5 |
2019-10-03 | CVE-2018-14461 | Out-of-bounds Read vulnerability in multiple products The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print(). | 7.5 |
2019-09-04 | CVE-2019-14319 | Cleartext Transmission of Sensitive Information vulnerability in Tiktok The TikTok (formerly Musical.ly) application 12.2.0 for Android and iOS performs unencrypted transmission of images, videos, and likes. | 3.3 |
2019-08-16 | CVE-2019-7959 | Improper Input Validation vulnerability in Adobe Creative Cloud Creative Cloud Desktop Application versions 4.6.1 and earlier have a using components with known vulnerabilities vulnerability. | 10.0 |
2019-08-16 | CVE-2019-7958 | Incorrect Permission Assignment for Critical Resource vulnerability in Adobe Creative Cloud Creative Cloud Desktop Application versions 4.6.1 and earlier have an insecure inherited permissions vulnerability. | 10.0 |
2019-08-16 | CVE-2019-7957 | Unspecified vulnerability in Adobe Creative Cloud Creative Cloud Desktop Application versions 4.6.1 and earlier have a security bypass vulnerability. | 5.0 |
2019-08-14 | CVE-2019-9506 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. | 4.8 |