Vulnerabilities (CVE)

Filtered by vendor Apple Subscribe
Filtered by product Airport Base Station Firmware
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-8581 1 Apple 1 Airport Base Station Firmware 2020-10-30 7.5 HIGH 9.8 CRITICAL
An out-of-bounds read was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to leak memory.
CVE-2019-8572 1 Apple 1 Airport Base Station Firmware 2020-10-30 7.5 HIGH 9.8 CRITICAL
A null pointer dereference was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause arbitrary code execution.
CVE-2019-8578 1 Apple 1 Airport Base Station Firmware 2020-10-30 7.5 HIGH 9.8 CRITICAL
A use after free issue was addressed with improved memory management. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause arbitrary code execution.
CVE-2015-7988 1 Apple 6 Airport Base Station, Airport Base Station Firmware, Iphone Os and 3 more 2019-06-19 7.5 HIGH 9.8 CRITICAL
The handle_regservice_request function in mDNSResponder before 625.41.2 allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference) via unspecified vectors.
CVE-2015-7987 1 Apple 6 Airport Base Station, Airport Base Station Firmware, Iphone Os and 3 more 2019-06-19 6.8 MEDIUM 9.8 CRITICAL
Multiple buffer overflows in mDNSResponder before 625.41.2 allow remote attackers to read or write to out-of-bounds memory locations via vectors involving the (1) GetValueForIPv4Addr, (2) GetValueForMACAddr, (3) rfc3110_import, or (4) CopyNSEC3ResourceRecord function.
CVE-2015-7029 1 Apple 1 Airport Base Station Firmware 2017-09-01 10.0 HIGH 9.8 CRITICAL
Apple AirPort Base Station Firmware before 7.6.7 and 7.7.x before 7.7.7 misparses DNS data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.