# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1501 |
CVE-2019-8633 |
20 |
|
|
2020-10-27 |
2020-10-28 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, tvOS 12.3, watchOS 5.3. An application may be able to read restricted memory. |
1502 |
CVE-2019-8631 |
|
|
|
2020-10-27 |
2020-10-28 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
A logic issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, tvOS 12.3. Users removed from an iMessage conversation may still be able to alter state. |
1503 |
CVE-2019-8618 |
|
|
|
2020-10-27 |
2020-10-28 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
A logic issue was addressed with improved restrictions. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. A sandboxed process may be able to circumvent sandbox restrictions. |
1504 |
CVE-2019-8612 |
|
|
|
2020-10-27 |
2020-10-30 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
A logic issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, tvOS 12.3, watchOS 5.2.1, macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3. An attacker in a privileged network position can modify driver state. |
1505 |
CVE-2019-8592 |
|
|
Exec Code Mem. Corr. |
2020-10-27 |
2021-07-21 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, tvOS 12.3, watchOS 5.2.1, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, iOS 13. Playing a malicious audio file may lead to arbitrary code execution. |
1506 |
CVE-2019-8588 |
476 |
|
DoS |
2020-10-27 |
2020-10-30 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
A null pointer dereference was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause a system denial of service. |
1507 |
CVE-2019-8582 |
125 |
|
|
2020-10-27 |
2020-10-28 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iCloud for Windows 7.12, tvOS 12.3, iTunes 12.9.5 for Windows, macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3. Processing a maliciously crafted font may result in the disclosure of process memory. |
1508 |
CVE-2019-8581 |
125 |
|
|
2020-10-27 |
2020-10-30 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
An out-of-bounds read was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to leak memory. |
1509 |
CVE-2019-8580 |
|
|
|
2020-10-27 |
2020-10-30 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
Source-routed IPv4 packets were disabled by default. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. Source-routed IPv4 packets may be unexpectedly accepted. |
1510 |
CVE-2019-8579 |
20 |
|
+Priv |
2020-10-27 |
2020-10-30 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to gain elevated privileges. |
1511 |
CVE-2019-8578 |
416 |
|
Exec Code |
2020-10-27 |
2020-10-30 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A use after free issue was addressed with improved memory management. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause arbitrary code execution. |
1512 |
CVE-2019-8575 |
|
|
|
2020-10-27 |
2020-10-30 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The issue was addressed with improved data deletion. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A base station factory reset may not delete all user information. |
1513 |
CVE-2019-8573 |
20 |
|
DoS |
2020-10-27 |
2020-10-30 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
An input validation issue was addressed with improved input validation. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, watchOS 5.2.1. A remote attacker may be able to cause a system denial of service. |
1514 |
CVE-2019-8572 |
476 |
|
Exec Code |
2020-10-27 |
2020-10-30 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A null pointer dereference was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause arbitrary code execution. |
1515 |
CVE-2019-8570 |
|
|
|
2020-10-27 |
2020-10-30 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
A logic issue was addressed with improved state management. This issue is fixed in iOS 12.1.3, iCloud for Windows 7.10, iTunes 12.9.3 for Windows, Safari 12.0.3, tvOS 12.1.2. Processing maliciously crafted web content may disclose sensitive user information. |
1516 |
CVE-2019-8569 |
|
|
Exec Code Mem. Corr. |
2020-10-27 |
2021-07-21 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to execute arbitrary code with system privileges. |
1517 |
CVE-2019-8564 |
|
|
|
2020-10-27 |
2020-10-30 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state. |
1518 |
CVE-2019-8547 |
125 |
|
|
2020-10-27 |
2020-10-29 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. A remote attacker may be able to leak memory. |
1519 |
CVE-2019-8539 |
|
|
Exec Code |
2020-10-27 |
2020-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. A malicious application may be able to execute arbitrary code with system privileges. |
1520 |
CVE-2019-8538 |
|
|
DoS |
2020-10-27 |
2020-10-29 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
A denial of service issue was addressed with improved validation. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. Processing a maliciously crafted vcf file may lead to a denial of service. |
1521 |
CVE-2019-8534 |
787 |
|
Exec Code Mem. Corr. |
2020-10-27 |
2020-10-29 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. A malicious application may be able to execute arbitrary code with kernel privileges. |
1522 |
CVE-2019-8532 |
|
|
|
2020-10-27 |
2020-10-30 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in watchOS 5.2, iOS 12.2. A malicious application may be able to access restricted files. |
1523 |
CVE-2019-8531 |
20 |
|
|
2020-10-27 |
2021-07-21 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A validation issue existed in Trust Anchor Management. This issue was addressed with improved validation. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An untrusted radius server certificate may be trusted. |
1524 |
CVE-2019-8528 |
416 |
|
Exec Code |
2020-10-27 |
2020-10-29 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An application may be able to execute arbitrary code with kernel privileges. |
1525 |
CVE-2019-8525 |
|
|
Exec Code Mem. Corr. |
2020-10-27 |
2021-07-21 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An application may be able to execute arbitrary code with kernel privileges. |
1526 |
CVE-2019-8509 |
|
|
|
2020-10-27 |
2020-10-30 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. A malicious application may be able to elevate privileges. |
1527 |
CVE-2019-7291 |
|
|
DoS |
2020-10-27 |
2020-10-29 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
A denial of service issue was addressed with improved memory handling. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. An attacker in a privileged position may be able to perform a denial of service attack. |
1528 |
CVE-2019-7288 |
|
|
|
2020-10-27 |
2020-10-30 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The issue was addressed with improved validation on the FaceTime server. This issue is fixed in macOS Mojave 10.14.3 Supplemental Update, iOS 12.1.4. A thorough security audit of the FaceTime service uncovered an issue with Live Photos . |
1529 |
CVE-2019-6238 |
20 |
|
Exec Code |
2020-10-27 |
2020-10-30 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. Processing a maliciously crafted package may lead to arbitrary code execution. |
1530 |
CVE-2019-4725 |
79 |
|
XSS |
2020-10-06 |
2020-10-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
IBM Security Access Manager Appliance 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172131. |
1531 |
CVE-2019-4680 |
89 |
|
Sql |
2020-10-20 |
2020-10-20 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.0.2.2 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 171733. |
1532 |
CVE-2019-4563 |
384 |
|
|
2020-10-29 |
2020-10-30 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
IBM Security Directory Server 6.4.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 166624. |
1533 |
CVE-2019-4552 |
|
|
XSS Http R.Spl. +Info |
2020-10-15 |
2020-10-20 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 are vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 165960. |
1534 |
CVE-2019-4547 |
209 |
|
|
2020-10-29 |
2020-10-30 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
IBM Security Directory Server 6.4.0 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 165949. |
1535 |
CVE-2019-4545 |
|
|
|
2020-10-08 |
2020-10-16 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
IBM QRadar SIEM 7.3 and 7.4 when configured to use Active Directory Authentication may be susceptible to spoofing attacks. IBM X-Force ID: 165877. |
1536 |
CVE-2019-4326 |
116 |
|
|
2020-10-06 |
2020-10-19 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
"HCL AppScan Enterprise security rules update administration section of the web application console is missing HTTP Strict-Transport-Security Header." |
1537 |
CVE-2019-4325 |
327 |
|
|
2020-10-06 |
2020-10-19 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
"HCL AppScan Enterprise makes use of broken or risky cryptographic algorithm to store REST API user details." |
1538 |
CVE-2019-2194 |
704 |
|
Exec Code |
2020-10-14 |
2020-10-16 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
In SurfaceFlinger::createLayer of SurfaceFlinger.cpp, there is a possible arbitrary code execution due to improper casting. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-137284057 |
1539 |
CVE-2018-21269 |
59 |
|
|
2020-10-27 |
2020-11-02 |
2.1 |
None |
Local |
Low |
Not required |
None |
Partial |
None |
checkpath in OpenRC through 0.42.1 might allow local users to take ownership of arbitrary files because a non-terminal path component can be a symlink. |
1540 |
CVE-2018-20243 |
522 |
|
|
2020-10-13 |
2020-10-16 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629. |
1541 |
CVE-2018-19953 |
79 |
|
XSS |
2020-10-28 |
2020-11-13 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109. |
1542 |
CVE-2018-19949 |
77 |
|
|
2020-10-28 |
2020-11-13 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109. |
1543 |
CVE-2018-19943 |
79 |
|
XSS |
2020-10-28 |
2020-11-13 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later |
1544 |
CVE-2018-18508 |
476 |
|
DoS |
2020-10-22 |
2021-02-18 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service. |
1545 |
CVE-2018-11764 |
306 |
|
|
2020-10-21 |
2022-06-03 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
Web endpoint authentication check is broken in Apache Hadoop 3.0.0-alpha4, 3.0.0-beta1, and 3.0.0. Authenticated users may impersonate any user even if no proxy user is configured. |
1546 |
CVE-2018-8062 |
79 |
|
XSS |
2020-10-23 |
2020-10-27 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
A cross-site scripting (XSS) vulnerability on Comtrend AR-5387un devices with A731-410JAZ-C04_R02.A2pD035g.d23i firmware allows remote attackers to inject arbitrary web script or HTML via the Service Description parameter while creating a WAN service. |
1547 |
CVE-2018-4474 |
400 |
|
|
2020-10-27 |
2020-10-29 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A memory consumption issue was addressed with improved memory handling. This issue is fixed in iCloud for Windows 7.7, watchOS 5, Safari 12, iOS 12, iTunes 12.9 for Windows, tvOS 12. Unexpected interaction causes an ASSERT failure. |
1548 |
CVE-2018-4468 |
|
|
|
2020-10-27 |
2020-10-30 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
This issue was addressed by removing additional entitlements. This issue is fixed in macOS Mojave 10.14.1, Security Update 2018-002 High Sierra, Security Update 2018-005 Sierra. A malicious application may be able to access restricted files. |
1549 |
CVE-2018-4467 |
|
|
Mem. Corr. |
2020-10-27 |
2020-10-30 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 Sierra. A malicious application may be able to elevate privileges. |
1550 |
CVE-2018-4452 |
|
|
Exec Code |
2020-10-27 |
2020-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
A memory consumption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 Sierra. A malicious application may be able to execute arbitrary code with system privileges. |