Total
3286 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-22657 | 1 Apple | 3 Garageband, Logic Pro X, Macos | 2022-03-25 | 6.8 MEDIUM | 7.8 HIGH |
A memory initialization issue was addressed with improved memory handling. This issue is fixed in Logic Pro 10.7.3, GarageBand 10.4.6, macOS Monterey 12.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution. | |||||
CVE-2022-22664 | 1 Apple | 3 Garageband, Logic Pro X, Macos | 2022-03-25 | 6.8 MEDIUM | 7.8 HIGH |
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Logic Pro 10.7.3, GarageBand 10.4.6, macOS Monterey 12.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution. | |||||
CVE-2022-22597 | 1 Apple | 2 Mac Os X, Macos | 2022-03-25 | 6.8 MEDIUM | 7.8 HIGH |
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted file may lead to arbitrary code execution. | |||||
CVE-2021-30771 | 1 Apple | 5 Ipados, Iphone Os, Macos and 2 more | 2022-03-25 | 6.8 MEDIUM | 7.8 HIGH |
An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.4, iOS 14.6 and iPadOS 14.6, watchOS 7.5, tvOS 14.6. Processing a maliciously crafted font file may lead to arbitrary code execution. | |||||
CVE-2022-22644 | 1 Apple | 1 Macos | 2022-03-24 | 4.3 MEDIUM | 5.5 MEDIUM |
A privacy issue existed in the handling of Contact cards. This was addressed with improved state management. This issue is fixed in macOS Monterey 12.3. A malicious application may be able to access information about a user's contacts. | |||||
CVE-2022-22632 | 1 Apple | 5 Ipados, Iphone Os, Macos and 2 more | 2022-03-24 | 7.5 HIGH | 9.8 CRITICAL |
A logic issue was addressed with improved state management. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, watchOS 8.5, macOS Monterey 12.3. A malicious application may be able to elevate privileges. | |||||
CVE-2022-22641 | 1 Apple | 4 Ipados, Iphone Os, Macos and 1 more | 2022-03-24 | 7.5 HIGH | 9.8 CRITICAL |
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3. An application may be able to gain elevated privileges. | |||||
CVE-2022-22611 | 1 Apple | 6 Ipados, Iphone Os, Itunes and 3 more | 2022-03-24 | 6.8 MEDIUM | 7.8 HIGH |
An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, iTunes 12.12.3 for Windows, watchOS 8.5, macOS Monterey 12.3. Processing a maliciously crafted image may lead to arbitrary code execution. | |||||
CVE-2022-22669 | 1 Apple | 1 Macos | 2022-03-24 | 7.2 HIGH | 7.8 HIGH |
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3. An application may be able to execute arbitrary code with kernel privileges. | |||||
CVE-2022-22609 | 1 Apple | 5 Ipados, Iphone Os, Macos and 2 more | 2022-03-24 | 5.0 MEDIUM | 7.5 HIGH |
The issue was addressed with additional permissions checks. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A malicious application may be able to read other applications' settings. | |||||
CVE-2022-22600 | 1 Apple | 5 Ipados, Iphone Os, Macos and 2 more | 2022-03-23 | 4.3 MEDIUM | 5.5 MEDIUM |
The issue was addressed with improved permissions logic. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A malicious application may be able to bypass certain Privacy preferences. | |||||
CVE-2021-40785 | 3 Adobe, Apple, Microsoft | 3 Premiere Elements, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2021-40788 | 3 Adobe, Apple, Microsoft | 3 Premiere Elements, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2021-40789 | 3 Adobe, Apple, Microsoft | 3 Premiere Elements, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2021-40796 | 3 Adobe, Apple, Microsoft | 3 Premiere Pro, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2021-42263 | 3 Adobe, Apple, Microsoft | 3 Premiere Pro, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2021-42264 | 3 Adobe, Apple, Microsoft | 3 Premiere Pro, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2021-40737 | 3 Adobe, Apple, Microsoft | 3 Audition, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Audition version 14.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2021-40742 | 3 Adobe, Apple, Microsoft | 3 Audition, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Audition version 14.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2021-40762 | 3 Adobe, Apple, Microsoft | 3 Character Animator, Macos, Windows | 2022-03-22 | 4.3 MEDIUM | 5.5 MEDIUM |
Adobe Character Animator version 4.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |