Vulnerabilities > Apple > Tvos > 12.1.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-12-18 | CVE-2019-8502 | Improper Input Validation vulnerability in Apple products An API issue existed in the handling of dictation requests. | 3.3 |
2019-12-18 | CVE-2019-7293 | Out-of-bounds Write vulnerability in Apple products A memory corruption issue was addressed with improved memory handling. | 5.5 |
2019-12-18 | CVE-2019-7292 | Improper Input Validation vulnerability in Apple products A validation issue was addressed with improved logic. | 6.5 |
2019-12-18 | CVE-2019-7285 | Use After Free vulnerability in Apple products A use after free issue was addressed with improved memory management. | 8.8 |
2019-12-18 | CVE-2019-6237 | Out-of-bounds Write vulnerability in Apple products Multiple memory corruption issues were addressed with improved memory handling. | 8.8 |
2019-12-18 | CVE-2019-6207 | Out-of-bounds Read vulnerability in Apple products An out-of-bounds read issue existed that led to the disclosure of kernel memory. | 5.5 |
2019-12-18 | CVE-2019-6201 | Out-of-bounds Write vulnerability in Apple products Multiple memory corruption issues were addressed with improved memory handling. | 8.8 |
2019-12-11 | CVE-2019-14899 | A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. | 7.4 |
2019-07-01 | CVE-2019-13118 | Type Confusion vulnerability in multiple products In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data. | 5.3 |
2019-04-03 | CVE-2018-20506 | Integer Overflow or Wraparound vulnerability in multiple products SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). | 8.1 |