Vulnerabilities > Apple > MAC OS X > 10.0.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-10-18 | CVE-2014-4430 | Cryptographic Issues vulnerability in Apple mac OS X CoreStorage in Apple OS X before 10.10 retains a volume's encryption keys upon an eject action in the unlocked state, which makes it easier for physically proximate attackers to obtain cleartext data via a remount. | 4.7 |
2014-10-18 | CVE-2014-4428 | Cryptographic Issues vulnerability in Apple mac OS X Bluetooth in Apple OS X before 10.10 does not require encryption for HID Low Energy devices, which allows remote attackers to spoof a device by leveraging previous pairing. | 5.4 |
2014-10-18 | CVE-2014-4427 | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X App Sandbox in Apple OS X before 10.10 allows attackers to bypass a sandbox protection mechanism via the accessibility API. | 7.5 |
2014-10-18 | CVE-2014-4426 | Information Exposure vulnerability in Apple mac OS X AFP File Server in Apple OS X before 10.10 allows remote attackers to discover the network addresses of all interfaces via an unspecified command to one interface. | 4.3 |
2014-10-18 | CVE-2014-4425 | Improper Authentication vulnerability in Apple mac OS X CFPreferences in Apple OS X before 10.10 does not properly enforce the "require password after sleep or screen saver begins" setting, which makes it easier for physically proximate attackers to obtain access by leveraging an unattended workstation. | 4.6 |
2014-10-18 | CVE-2014-4417 | Improper Input Validation vulnerability in Apple mac OS X Safari in Apple OS X before 10.10 allows remote attackers to cause a denial of service (universal Push Notification outage) via a web site that triggers an uncaught SafariNotificationAgent exception by providing a crafted Push Notification. | 5.0 |
2014-10-18 | CVE-2014-4391 | Cryptographic Issues vulnerability in Apple mac OS X The Code Signing feature in Apple OS X before 10.10 does not properly handle incomplete resource envelopes in signed bundles, which allows remote attackers to bypass intended app-author restrictions by omitting an execution-related resource. | 6.8 |
2014-10-18 | CVE-2014-4351 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple mac OS X Buffer overflow in QuickTime in Apple OS X before 10.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted audio samples in an m4a file. | 6.8 |
2014-10-15 | CVE-2014-3566 | Cryptographic Issues vulnerability in multiple products The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue. | 3.4 |
2014-10-08 | CVE-2014-7185 | Numeric Errors vulnerability in multiple products Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function. | 6.4 |