VUMETRIC
CYBER PORTAL
Dashboard
Security News
Latest Vulnerabilities
Browse Vulnerabilities
by Vendors
by Products
by Categories
Weekly Reports
Vulnerabilities
>
Apple
>
Tvos
> 13.4
Exclude new CVEs:
DATE
CVE
VULNERABILITY TITLE
RISK
2020-04-14
CVE-2020-11762
Out-of-bounds Write vulnerability in multiple products
An issue was discovered in OpenEXR before 2.4.1.
local
low complexity
openexr
fedoraproject
canonical
opensuse
debian
apple
CWE-787
5.5
5.5
2020-04-14
CVE-2020-11761
Out-of-bounds Read vulnerability in multiple products
An issue was discovered in OpenEXR before 2.4.1.
local
low complexity
openexr
fedoraproject
canonical
debian
apple
CWE-125
5.5
5.5
2020-04-14
CVE-2020-11760
Out-of-bounds Read vulnerability in multiple products
An issue was discovered in OpenEXR before 2.4.1.
local
low complexity
openexr
fedoraproject
canonical
opensuse
debian
apple
CWE-125
5.5
5.5
2020-04-14
CVE-2020-11759
Integer Overflow or Wraparound vulnerability in multiple products
An issue was discovered in OpenEXR before 2.4.1.
local
low complexity
openexr
fedoraproject
canonical
debian
apple
CWE-190
5.5
5.5
2020-04-14
CVE-2020-11758
Out-of-bounds Read vulnerability in multiple products
An issue was discovered in OpenEXR before 2.4.1.
local
low complexity
openexr
fedoraproject
canonical
opensuse
debian
apple
CWE-125
5.5
5.5
2020-02-27
CVE-2020-3878
Out-of-bounds Read vulnerability in Apple products
An out-of-bounds read was addressed with improved input validation.
local
low complexity
apple
CWE-125
7.8
7.8
2020-02-24
CVE-2019-20044
Improper Check for Dropped Privileges vulnerability in multiple products
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option.
local
low complexity
zsh
fedoraproject
debian
apple
CWE-273
7.8
7.8
2019-12-11
CVE-2019-14899
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream.
low complexity
freebsd
linux
openbsd
apple
7.4
7.4
«
Previous
1
2
...
77
78
79
80
81
(current)
»