Filter
AND
AND

Versions

10.15
166
10.15.7
166
10.15.7-security_update_2020-001
149
10.15.7-security_update_2021-001
137
10.15.7-supplemental_update
133
10.15.7-security_update_2021-002
119
10.14.6
117
10.14.6-security_update_2020-002
113
10.14.6-security_update_2020-001
111
10.14.6-security_update_2020-003
109
10.14.6-security_update_2020-004
105
10.14.6-security_update_2020-005
102
10.14.6-security_update_2020-006
102
10.15.7-security_update_2021-003
100
10.14.6-security_update_2019-006
94
10.14.6-security_update_2019-007
94
10.14
93
10.15.7-security_update_2020-005
93
10.15.7-security_update_2020-007
92
10.14.6-supplemental_update
89
10.14.6-supplemental_update_2
89
10.15.7-security_update_2020
88
10.14.6-security_update_2019-004
87
10.14.6-security_update_2019-005
87
10.14.6-security_update_2020-007
83
10.14.6-security_update_2019-001
80
10.14.6-security_update_2019-002
79
10.15.7-security_update_2021-006
73
10.15.7-security_update_2021-004
66
10.15.6
63
10.15.7-security_update_2021-005
57
10.15.7-security_update_2021-007
57
10.3.9
55
10.14.6-security_update_2021-001
51
10.4.2
51
10.14.6-security_update_2021-002
48
10.4.1
47
10.4.3
46
10.15.7-security_update_2021-008
45
10.4.6
45
10.15.7-security_update_2022-001
43
10.4.4
43
10.4.5
43
10.4.8
43
10.15.7-security_update_2022-002
42
10.4.7
41
10.14.5
40
10.4
40
10.10.4
39
10.15.7-security_update_2022-003
37
10.3.3
36
10.3
34
10.3.2
34
10.3.4
34
10.4.9
34
10.3.1
33
10.14.6-security_update_2021-003
32
10.3.5
32
10.2.8
31
10.5.2
31
10.2
30
10.5.1
30
10.2.2
29
10.3.6
29
10.5
28
10.5.3
27
10.5.4
27
10.2.1
26
10.2.3
26
10.3.7
26
10.14.0
25
10.3.8
25
10.12.3
24
10.2.4
24
10.5.5
24
10.5.6
24
10.6.0
24
10.0.3
23
10.2.5
23
10.2.6
23
10.4.11
23
10.0
22
10.0.1
22
10.0.2
22
10.0.4
22
10.10.5
22
10.13.6
22
10.15.6-supplemental_update
22
10.2.7
22
10.1
21
10.1.1
21
10.1.2
21
10.1.3
21
10.1.4
21
10.1.5
21
10.15.5
21
10.6.2
21
10.5.0
20
10.6.1
20
10.10.3
19
10.12.1
19
10.4.10
19
10.5.8
19
10.13.0
17
10.13.6-security_update_2018-002
16
10.13.6-security_update_2018-003
16
10.13.6-security_update_2019-001
16
10.13.6-security_update_2019-002
16
10.5.7
16
10.11.0
15
10.11.5
15
10.13.6-security_update_2019-003
15
10.13.6-security_update_2019-004
15
10.13.6-security_update_2019-005
15
10.13.6-security_update_2019-006
15
10.6.3
15
10.11.6
14
10.12
14
10.12.6
14
10.13.6-security_update_2019-007
14
10.13.6-security_update_2020-001
14
10.13.6-security_update_2020-002
14
10.6.4
14
10.7.0
14
10.10.1
13
10.11.3
12
10.6.8
12
10.7.1
12
10.11.1
11
10.14.6-security_update_2021-004
11
10.7.2
11
10.9.5
11
10.0.0
10
10.12.0
10
10.13
10
10.13.6-security_update_2020-003
10
10.14.1
10
10.14.3
10
10.15.2
10
10.6.5
10
10.6.6
10
10.6.7
10
10.10.2
9
10.11.4
9
10.12.4
9
10.12.5
9
10.15.1
9
10.15.3
9
10.15.4
9
10.4.0
9
10.9.1
9
10.14.2
8
10.14.4
8
10.15.7-security_update_2022-004
7
10.8.5
7
10.1.0
6
10.10.0
6
10.11.6-security_update_2016-001
6
10.11.6-security_update_2016-002
6
10.11.6-security_update_2016-003
6
10.11.6-security_update_2017-001
6
10.11.6-security_update_2017-002
6
10.11.6-security_update_2017-003
6
10.14.4-beta4
6
10.2.0
6
10.3.0
6
10.5.2-2008-002
6
10.8.0
6
10.9
6
10.11
5
10.8.1
5
10.8.2
5
10.8.3
5
10.8.4
5
10.11.2
4
10.12.6-security_update_2017-001
4
10.7.3
4
10.11.6-security_update_2017-004
3
10.13.6-security_update_2020-004
3
10.13.6-supplemental_update
3
10.7.4
3
10.12.6-security_update_2018-001
2
10.12.6-security_update_2018-002
2
10.15.0
2
10.7.5
2
10.8.5-supplemental_update
2
11.0.0
2
10.11.6-security_update_2017-005
1
10.11.6-security_update_2018-001
1
10.11.6-security_update_2018-002
1
10.12.6-security_update_2017-002
1
10.12.6-security_update_2018-003
1
10.12.6-security_update_2018-004
1
10.12.6-security_update_2018-005
1
10.12.6-security_update_2018-006
1
10.12.6-security_update_2019-001
1
10.12.6-security_update_2019-002
1
10.13.3
1
10.4.
1
10.6.9
1
10.9.0
1
10.9.2
1
10.9.3
1
10.9.4
1
11.0.1
1

Adobe ColdFusionAdobe ColdFusion Information Disclosure Vulnerability

First published (updated )

Adobe ColdFusionAdobe ColdFusion Directory Traversal Vulnerability

First published (updated )

Apple OS XApple OS X Authentication Bypass Vulnerability

First published (updated )

Mozilla SeaMonkeyMozilla Network Security Services (NSS) could allow a remote attacker to bypass security restriction…

7.5
First published (updated )

Cisco Advanced Malware Protection For EndpointsA vulnerability in Cisco AMP for Endpoints Mac Connector Software installed on Apple macOS 10.12 cou…

7.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple Mac OS XWebRTC Heap Buffer Overflow Vulnerability

First published (updated )

Debian Debian LinuxHeap-based Buffer Overflow in vim/vim

7.8
First published (updated )

Apple Mac OS XOut-of-bounds Read in vim/vim

7.8
First published (updated )

Apple Mac OS XUse After Free in vim/vim

7.8
First published (updated )

Apple Mac OS XUse After Free in vim/vim

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple Mac OS XUse After Free in vim/vim

7.8
First published (updated )

Apple Mac OS XOut-of-bounds Read in vim/vim

7.1
First published (updated )

Apple Mac OS XHeap-based Buffer Overflow in vim/vim

7.8
First published (updated )

Apple Mac OS XPossible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier

8.2
First published (updated )

Apple Mac OS XApple iOS, macOS, watchOS Sandbox Bypass Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple Mac OS XApple Multiple Products Integer Overflow Vulnerability

First published (updated )

Apple Mac OS XApple macOS Unspecified Vulnerability

First published (updated )

Apple Mac OS XApple Multiple Products Type Confusion Vulnerability

First published (updated )

Apple Mac OS XApple Multiple Products Race Condition Vulnerability

First published (updated )

Apple watchOSApple Multiple Products Code Execution Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple watchOSApple Multiple Products Memory Corruption Vulnerability

First published (updated )

Nodejs Node.jsSome HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service

7.8
First published (updated )

redhat/jbcs-httpd24-httpdSome HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service

7.5
First published (updated )

Nodejs Node.jsSome HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service

7.8
First published (updated )

Nodejs Node.jsSome HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

F5 Big-ip Local Traffic ManagerSome HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service

7.8
First published (updated )

F5 Big-ip Local Traffic ManagerSome HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service

7.8
First published (updated )

Nodejs Node.jsSome HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service

7.8
First published (updated )

Google AndroidBlutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation

8.1
First published (updated )

Apple Mac OS XApple macOS Use-After-Free Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203