Total
5524 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-8835 | 1 Apple | 1 Mac Os X | 2017-09-07 | 9.3 HIGH | N/A |
The xpc_data_get_bytes function in libxpc in Apple OS X before 10.10.2 does not verify that a dictionary's Attributes key has the xpc_data data type, which allows attackers to execute arbitrary code by providing a crafted dictionary to sysmond, related to an "XPC type confusion" issue. | |||||
CVE-2014-8834 | 1 Apple | 1 Mac Os X | 2017-09-07 | 2.1 LOW | N/A |
UserAccountUpdater in Apple OS X 10.10 before 10.10.2 stores a PDF document's password in a printing preference file, which allows local users to obtain sensitive information by reading a file. | |||||
CVE-2014-8833 | 1 Apple | 1 Mac Os X | 2017-09-07 | 2.1 LOW | N/A |
SpotlightIndex in Apple OS X before 10.10.2 does not properly perform deserialization during access to a permission cache, which allows local users to read search results associated with other users' protected files via a Spotlight query. | |||||
CVE-2014-8832 | 1 Apple | 1 Mac Os X | 2017-09-07 | 4.9 MEDIUM | N/A |
The indexing functionality in Spotlight in Apple OS X before 10.10.2 writes memory contents to an external hard drive, which allows local users to obtain sensitive information by reading from this drive. | |||||
CVE-2014-8837 | 1 Apple | 1 Mac Os X | 2017-09-07 | 9.3 HIGH | N/A |
Multiple unspecified vulnerabilities in the Bluetooth driver in Apple OS X before 10.10.2 allow attackers to execute arbitrary code in a privileged context via a crafted app. | |||||
CVE-2014-8831 | 1 Apple | 1 Mac Os X | 2017-09-07 | 5.0 MEDIUM | N/A |
security_taskgate in Apple OS X before 10.10.2 allows attackers to read group-ACL-restricted keychain items of arbitrary apps via a crafted app with a signature from a (1) self-signed certificate or (2) Developer ID certificate. | |||||
CVE-2014-8830 | 1 Apple | 1 Mac Os X | 2017-09-07 | 6.8 MEDIUM | N/A |
Heap-based buffer overflow in SceneKit in Apple OS X before 10.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted accessor element in a Collada file. | |||||
CVE-2014-8829 | 1 Apple | 1 Mac Os X | 2017-09-07 | 7.5 HIGH | N/A |
SceneKit in Apple OS X before 10.10.2 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted app. | |||||
CVE-2014-8828 | 1 Apple | 1 Mac Os X | 2017-09-07 | 7.5 HIGH | N/A |
Sandbox in Apple OS X before 10.10 allows attackers to write to the sandbox-profile cache via a sandboxed app that includes a com.apple.sandbox segment in a path. | |||||
CVE-2014-8827 | 1 Apple | 1 Mac Os X | 2017-09-07 | 2.1 LOW | N/A |
LoginWindow in Apple OS X before 10.10.2 does not transition to the lock-screen state immediately upon being woken from sleep, which allows physically proximate attackers to obtain sensitive information by reading the screen. | |||||
CVE-2014-8825 | 1 Apple | 1 Mac Os X | 2017-09-07 | 7.2 HIGH | N/A |
The kernel in Apple OS X before 10.10.2 does not properly perform identitysvc validation of certain directory-service functionality, which allows local users to gain privileges or spoof directory-service responses via unspecified vectors. | |||||
CVE-2014-8824 | 1 Apple | 1 Mac Os X | 2017-09-07 | 10.0 HIGH | N/A |
The kernel in Apple OS X before 10.10.2 does not properly validate IODataQueue object metadata fields, which allows attackers to execute arbitrary code in a privileged context via a crafted app. | |||||
CVE-2014-8822 | 1 Apple | 1 Mac Os X | 2017-09-07 | 10.0 HIGH | N/A |
IOHIDFamily in Apple OS X before 10.10.2 allows attackers to execute arbitrary code in a kernel context or cause a denial of service (write to kernel memory) via a crafted app that calls an unspecified user-client method. | |||||
CVE-2014-8821 | 1 Apple | 1 Mac Os X | 2017-09-07 | 7.2 HIGH | N/A |
The Intel Graphics Driver in Apple OS X before 10.10.2 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2014-8819 and CVE-2014-8820. | |||||
CVE-2014-8820 | 1 Apple | 1 Mac Os X | 2017-09-07 | 7.2 HIGH | N/A |
The Intel Graphics Driver in Apple OS X before 10.10.2 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2014-8819 and CVE-2014-8821. | |||||
CVE-2014-8819 | 1 Apple | 1 Mac Os X | 2017-09-07 | 7.2 HIGH | N/A |
The Intel Graphics Driver in Apple OS X before 10.10.2 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2014-8820 and CVE-2014-8821. | |||||
CVE-2014-8817 | 1 Apple | 1 Mac Os X | 2017-09-07 | 10.0 HIGH | N/A |
coresymbolicationd in CoreSymbolication in Apple OS X before 10.10.2 does not verify that expected data types are present in XPC messages, which allows attackers to execute arbitrary code in a privileged context via a crafted app, as demonstrated by lack of verification of xpc_dictionary_get_value API return values during handling of a (1) match_mmap_archives, (2) delete_mmap_archives, (3) write_mmap_archive, or (4) read_mmap_archive command. | |||||
CVE-2014-8816 | 1 Apple | 1 Mac Os X | 2017-09-07 | 6.8 MEDIUM | N/A |
CoreGraphics in Apple OS X before 10.10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted PDF document. | |||||
CVE-2014-8823 | 1 Apple | 1 Mac Os X | 2017-09-07 | 4.7 MEDIUM | N/A |
The IOUSBControllerUserClient::ReadRegister function in the IOUSB controller in IOUSBFamily in Apple OS X before 10.10.2 allows local users to read data from arbitrary kernel-memory locations by leveraging root access and providing a crafted first argument. | |||||
CVE-2014-5333 | 5 Adobe, Apple, Google and 2 more | 7 Adobe Air, Adobe Air Sdk, Flash Player and 4 more | 2017-09-07 | 4.3 MEDIUM | N/A |
Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API, in conjunction with a manipulation involving a '$' (dollar sign) or '(' (open parenthesis) character. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671. |