This page was not yet optimized for use on mobile devices.
CVE-2022-26726
Data ?
Vulnerability ID | CVE-2022-26726 |
---|---|
Published on | 26.05.2022 19:15 |
Severity | MEDIUM |
Vulnerable configurations ?
-
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*,
cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*,
…
Vulnerable certificates ?
Note that this currently lists only certificates matched to the CVE via its CPEs, it does not include certificates that directly or indirectly reference the vulnerable certificate.
Common Criteria certificates Display network
- Apple Mac OS X v10.3.6 and Apple Mac OS X Server V10.3.6
- Apple Mac OS X 10.6
- Apple macOS 11 Big Sur: Contacts
- Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1
- Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
- Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))
- Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
- Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))