Vulnerabilities > Apple > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-08 | CVE-2018-4201 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products An issue was discovered in certain Apple products. | 8.8 |
2018-06-08 | CVE-2018-4200 | Use After Free vulnerability in multiple products An issue was discovered in certain Apple products. | 8.8 |
2018-06-08 | CVE-2018-4199 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products An issue was discovered in certain Apple products. | 8.8 |
2018-06-08 | CVE-2018-4196 | Information Exposure vulnerability in Apple mac OS X An issue was discovered in certain Apple products. | 7.8 |
2018-06-08 | CVE-2018-4193 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X An issue was discovered in certain Apple products. | 7.8 |
2018-06-08 | CVE-2018-4192 | Race Condition vulnerability in Apple products An issue was discovered in certain Apple products. | 7.5 |
2018-06-08 | CVE-2018-4190 | Insufficiently Protected Credentials vulnerability in multiple products An issue was discovered in certain Apple products. | 8.8 |
2018-06-08 | CVE-2018-4184 | Unspecified vulnerability in Apple mac OS X An issue was discovered in certain Apple products. | 7.5 |
2018-06-07 | CVE-2018-12015 | Link Following vulnerability in multiple products In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name. | 7.5 |
2018-05-08 | CVE-2018-8897 | Race Condition vulnerability in multiple products A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. | 7.8 |