Vulnerabilities > Apple > High

DATE CVE VULNERABILITY TITLE RISK
2019-12-18 CVE-2019-8503 Improper Input Validation vulnerability in Apple products
A logic issue was addressed with improved validation.
network
low complexity
apple CWE-20
8.8
2019-12-18 CVE-2019-7287 Out-of-bounds Write vulnerability in Apple Iphone OS
A memory corruption issue was addressed with improved input validation.
local
low complexity
apple CWE-787
7.8
2019-12-18 CVE-2019-7286 Out-of-bounds Write vulnerability in Apple mac OS X
A memory corruption issue was addressed with improved input validation.
local
low complexity
apple CWE-787
7.8
2019-12-18 CVE-2019-7285 Use After Free vulnerability in Apple products
A use after free issue was addressed with improved memory management.
network
low complexity
apple CWE-416
8.8
2019-12-18 CVE-2019-6239 Unspecified vulnerability in Apple mac OS X
This issue was addressed with improved handling of file metadata.
local
low complexity
apple
7.8
2019-12-18 CVE-2019-6237 Out-of-bounds Write vulnerability in Apple products
Multiple memory corruption issues were addressed with improved memory handling.
network
low complexity
apple CWE-787
8.8
2019-12-18 CVE-2019-6236 Race Condition vulnerability in Apple Icloud
A race condition existed during the installation of iCloud for Windows.
network
high complexity
apple CWE-362
7.5
2019-12-18 CVE-2019-6232 Race Condition vulnerability in Apple Icloud
A race condition existed during the installation of iTunes for Windows.
network
high complexity
apple CWE-362
7.5
2019-12-18 CVE-2019-6201 Out-of-bounds Write vulnerability in Apple products
Multiple memory corruption issues were addressed with improved memory handling.
network
low complexity
apple CWE-787
8.8
2019-12-11 CVE-2019-14899 A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream.
low complexity
freebsd linux openbsd apple
7.4