Vulnerabilities > Apple > Tvos > 13.3.1

DATE CVE VULNERABILITY TITLE RISK
2020-04-01 CVE-2020-3899 Unspecified vulnerability in Apple products
A memory consumption issue was addressed with improved memory handling.
network
low complexity
apple
8.8
2020-04-01 CVE-2020-3897 Type Confusion vulnerability in Apple products
A type confusion issue was addressed with improved memory handling.
network
low complexity
apple CWE-843
8.8
2020-04-01 CVE-2020-3895 Out-of-bounds Write vulnerability in Apple products
A memory corruption issue was addressed with improved memory handling.
network
low complexity
apple CWE-787
8.8
2020-04-01 CVE-2020-3894 Race Condition vulnerability in Apple products
A race condition was addressed with additional validation.
network
high complexity
apple CWE-362
3.1
2020-04-01 CVE-2020-3887 Unspecified vulnerability in Apple products
A logic issue was addressed with improved restrictions.
network
low complexity
apple
4.3
2020-04-01 CVE-2020-3885 Always-Incorrect Control Flow Implementation vulnerability in Apple products
A logic issue was addressed with improved restrictions.
network
low complexity
apple CWE-670
4.3
2020-04-01 CVE-2020-3883 Unspecified vulnerability in Apple products
This issue was addressed with improved checks.
network
low complexity
apple
8.8
2020-02-27 CVE-2020-3878 Out-of-bounds Read vulnerability in Apple products
An out-of-bounds read was addressed with improved input validation.
local
low complexity
apple CWE-125
7.8
2020-02-24 CVE-2019-20044 Improper Check for Dropped Privileges vulnerability in multiple products
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option.
local
low complexity
zsh fedoraproject debian apple CWE-273
7.8
2019-12-11 CVE-2019-14899 A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream.
low complexity
freebsd linux openbsd apple
7.4