The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Apple macOS

Bluetooth Firmware: information disclosure via Weak Elliptic Curve Parameters
An attacker can bypass access restrictions to data via Weak Elliptic Curve Parameters of Bluetooth Firmware, in order to obtain sensitive information...
CERTFR-2019-AVI-188, CERTFR-2019-AVI-391, CERTFR-2019-AVI-419, CVE-2018-5383, DLA-1747-1, HT208848, HT208849, HT208937, HT209139, openSUSE-SU-2019:0275-1, RHSA-2019:2169-01, SUSE-SU-2019:0422-1, SUSE-SU-2019:0427-1, SUSE-SU-2019:0427-2, SUSE-SU-2019:0466-1, USN-4094-1, USN-4095-1, USN-4095-2, USN-4118-1, USN-4351-1, VIGILANCE-VUL-28536
SQLite: buffer overflow via sqlite3_value_text
An attacker can trigger a buffer overflow via sqlite3_value_text() of SQLite, in order to trigger a denial of service, and possibly to run code...
384, CVE-2017-2520, HT207797, HT207798, USN-4019-1, USN-4019-2, VIGILANCE-VUL-28256
SQLite: memory corruption via Table Objects
An attacker can trigger a memory corruption via Table Objects of SQLite, in order to trigger a denial of service, and possibly to run code...
288, CVE-2017-2519, HT207797, HT207798, USN-4019-1, USN-4019-2, VIGILANCE-VUL-28255
SQLite: use after free via Query Optimizer
An attacker can force the usage of a freed memory area via Query Optimizer of SQLite, in order to trigger a denial of service, and possibly to run code...
199, CVE-2017-2518, HT207797, HT207798, SUSE-SU-2019:14227-1, SUSE-SU-2019:14228-1, SUSE-SU-2019:3050-1, USN-4019-1, USN-4019-2, VIGILANCE-VUL-28254
SQLite, Chrome: memory corruption via FTS3 Query
An attacker can generate a memory corruption via a FTS3 query of SQLite, in order to trigger a denial of service, and possibly to run code...
cpuapr2020, CVE-2018-20346, CVE-2018-20505, CVE-2018-20506, DLA-1613-1, DSA-2020-030, DSA-4352-1, FEDORA-2018-5f91fbf4fd, FEDORA-2018-ccbe8b931c, FEDORA-2019-49f80a78bc, FreeBSD-EN-19:03.sqlite, HT209443, HT209446, Magellan, openSUSE-SU-2018:4056-1, openSUSE-SU-2018:4122-1, openSUSE-SU-2018:4142-1, openSUSE-SU-2018:4143-1, openSUSE-SU-2019:1159-1, openSUSE-SU-2019:1222-1, RHSA-2018:3803-01, SUSE-SU-2019:0913-1, SUSE-SU-2019:0973-1, SUSE-SU-2019:14003-1, Synology-SA-18:61, USN-4019-1, USN-4019-2, VIGILANCE-VUL-28027
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
CERTFR-2018-AVI-586, CVE-2018-4303, CVE-2018-4431, CVE-2018-4434, CVE-2018-4435, CVE-2018-4447, CVE-2018-4449, CVE-2018-4450, CVE-2018-4460, CVE-2018-4461, CVE-2018-4462, CVE-2018-4463, CVE-2018-4465, HT209341, VIGILANCE-VUL-27956, ZDI-18-1363, ZDI-18-1364, ZDI-18-1365
Perl Core: out-of-bounds memory reading via S_grok_bslash_N
An attacker can force a read at an invalid address via S_grok_bslash_N() of Perl Core, in order to trigger a denial of service, or to obtain sensitive information...
133192, bulletinapr2019, CVE-2018-18313, DSA-4347-1, FEDORA-2018-9dbe983805, FEDORA-2018-ca03363d57, HT209600, NTAP-20190221-0003, openSUSE-SU-2018:4258-1, RHSA-2019:0001-01, RHSA-2019:0010-01, SUSE-SU-2018:4187-1, USN-3834-1, USN-3834-2, VIGILANCE-VUL-27918
Perl Core: integer overflow via Perl_my_setenv
An attacker can generate an integer overflow via Perl_my_setenv() of Perl Core, in order to trigger a denial of service, and possibly to run code...
133204, bulletinjan2019, cpujul2019, CVE-2018-18311, DLA-1601-1, DSA-4347-1, FEDORA-2018-9dbe983805, FEDORA-2018-ca03363d57, HT209600, NTAP-20190221-0003, openSUSE-SU-2018:4258-1, RHSA-2019:0001-01, RHSA-2019:0010-01, RHSA-2019:0109-01, RHSA-2019:1790-01, RHSA-2019:1942-01, RHSA-2019:2400-01, SB10276, SB10278, SUSE-SU-2018:4187-1, SUSE-SU-2019:2264-1, USN-3834-1, USN-3834-2, VIGILANCE-VUL-27916
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
CERTFR-2018-AVI-524, CVE-2018-4126, CVE-2018-4153, CVE-2018-4203, CVE-2018-4242, CVE-2018-4259, CVE-2018-4286, CVE-2018-4287, CVE-2018-4288, CVE-2018-4291, CVE-2018-4295, CVE-2018-4304, CVE-2018-4308, CVE-2018-4310, CVE-2018-4326, CVE-2018-4331, CVE-2018-4334, CVE-2018-4340, CVE-2018-4341, CVE-2018-4342, CVE-2018-4346, CVE-2018-4348, CVE-2018-4350, CVE-2018-4354, CVE-2018-4368, CVE-2018-4369, CVE-2018-4371, CVE-2018-4389, CVE-2018-4393, CVE-2018-4394, CVE-2018-4395, CVE-2018-4396, CVE-2018-4398, CVE-2018-4399, CVE-2018-4400, CVE-2018-4401, CVE-2018-4402, CVE-2018-4403, CVE-2018-4406, CVE-2018-4407, CVE-2018-4408, CVE-2018-4410, CVE-2018-4411, CVE-2018-4412, CVE-2018-4413, CVE-2018-4415, CVE-2018-4417, CVE-2018-4418, CVE-2018-4419, CVE-2018-4420, CVE-2018-4422, CVE-2018-4423, CVE-2018-4424, CVE-2018-4425, CVE-2018-4426, HT209193, VIGILANCE-VUL-27651, ZDI-18-1322, ZDI-18-1324, ZDI-18-1325, ZDI-18-1326, ZDI-18-1327, ZDI-18-1328, ZDI-18-1346
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
CERTFR-2018-AVI-329, CVE-2018-4178, CVE-2018-4248, CVE-2018-4259, CVE-2018-4268, CVE-2018-4269, CVE-2018-4276, CVE-2018-4277, CVE-2018-4280, CVE-2018-4283, CVE-2018-4285, CVE-2018-4286, CVE-2018-4287, CVE-2018-4288, CVE-2018-4289, CVE-2018-4291, CVE-2018-4293, HT208937, VIGILANCE-VUL-26662, ZDI-18-1291, ZDI-18-602, ZDI-18-607
Our database contains other pages. You can request a free trial to read them.

Display information about Apple macOS: