Vulnerabilities > Microsoft > Windows > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-08 | CVE-2018-4204 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products An issue was discovered in certain Apple products. | 6.8 |
2018-06-08 | CVE-2018-4201 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products An issue was discovered in certain Apple products. | 6.8 |
2018-06-08 | CVE-2018-4200 | Use After Free vulnerability in Apple products An issue was discovered in certain Apple products. | 6.8 |
2018-06-08 | CVE-2018-4199 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products An issue was discovered in certain Apple products. | 6.8 |
2018-06-08 | CVE-2018-4192 | Race Condition vulnerability in Apple products An issue was discovered in certain Apple products. | 5.1 |
2018-06-08 | CVE-2018-4190 | Insufficiently Protected Credentials vulnerability in Apple products An issue was discovered in certain Apple products. | 4.3 |
2018-06-08 | CVE-2018-4188 | Improper Input Validation vulnerability in Apple products An issue was discovered in certain Apple products. | 4.3 |
2018-05-25 | CVE-2018-6236 | Race Condition vulnerability in Trendmicro products A Time-of-Check Time-of-Use privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222813 by the tmusa driver. | 6.9 |
2018-05-25 | CVE-2018-1565 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM DB2 IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow a local user to overflow a buffer which may result in a privilege escalation to the DB2 instance owner. | 4.6 |
2018-05-25 | CVE-2018-1544 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM DB2 IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow a local user to overflow a buffer which may result in a privilege escalation to the DB2 instance owner. | 4.6 |