Memory corruption in multiple Apple products
Reporter | Title | Published | Views | Family All 92 |
---|---|---|---|---|
![]() | Memory corruption | 1 Nov 202220:15 | – | prion |
![]() | CVE-2022-26716 | 1 Nov 202220:15 | – | nvd |
![]() | CVE-2022-26716 | 1 Nov 202220:15 | – | debiancve |
![]() | Arbitrary Code Execution | 31 Dec 202200:46 | – | veracode |
![]() | CVE-2022-26716 | 30 May 202200:00 | – | ubuntucve |
![]() | CVE-2022-26716 | 1 Nov 202220:15 | – | cve |
![]() | CVE-2022-26716 | 7 Jun 202202:29 | – | redhatcve |
![]() | Fedora: Security Advisory for webkit2gtk3 (FEDORA-2022-c05acca28d) | 19 Jun 202200:00 | – | openvas |
![]() | Fedora: Security Advisory for webkit2gtk3 (FEDORA-2022-e883576e1c) | 6 Jun 202200:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-5457-1) | 1 Jun 202200:00 | – | openvas |
[
{
"vendor": "Apple",
"product": "macOS",
"versions": [
{
"version": "unspecified",
"lessThan": "12.4",
"status": "affected",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "macOS",
"versions": [
{
"version": "unspecified",
"lessThan": "15.5",
"status": "affected",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "watchOS",
"versions": [
{
"version": "unspecified",
"lessThan": "8.6",
"status": "affected",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "watchOS",
"versions": [
{
"version": "unspecified",
"lessThan": "15.5",
"status": "affected",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "watchOS",
"versions": [
{
"version": "unspecified",
"lessThan": "15.5",
"status": "affected",
"versionType": "custom"
}
]
}
]
Source | Link |
---|---|
support | www.support.apple.com/en-us/HT213257 |
support | www.support.apple.com/en-us/HT213258 |
support | www.support.apple.com/en-us/HT213254 |
support | www.support.apple.com/en-us/HT213253 |
support | www.support.apple.com/en-us/HT213260 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo