Vulnerabilities > Apple > Tvos > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-05-22 | CVE-2017-2513 | Use After Free vulnerability in Apple products An issue was discovered in certain Apple products. | 9.8 |
2017-05-22 | CVE-2017-2518 | Use After Free vulnerability in multiple products An issue was discovered in certain Apple products. | 9.8 |
2017-05-22 | CVE-2017-2519 | An issue was discovered in certain Apple products. | 9.8 |
2017-05-22 | CVE-2017-2520 | Out-of-bounds Write vulnerability in multiple products An issue was discovered in certain Apple products. | 9.8 |
2017-05-22 | CVE-2017-2522 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products An issue was discovered in certain Apple products. | 9.8 |
2017-05-22 | CVE-2017-2523 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products An issue was discovered in certain Apple products. | 9.8 |
2017-05-22 | CVE-2017-2524 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products An issue was discovered in certain Apple products. | 9.8 |
2017-04-02 | CVE-2017-2428 | Unspecified vulnerability in Apple products An issue was discovered in certain Apple products. | 9.8 |
2016-09-25 | CVE-2016-4658 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document. | 9.8 |
2016-09-25 | CVE-2016-4702 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products Audio in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 9.8 |