Vulnerabilities > Apple > MAC OS X > 10.10.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-07-20 | CVE-2017-7017 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X An issue was discovered in certain Apple products. | 9.3 |
2017-07-20 | CVE-2017-7016 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X An issue was discovered in certain Apple products. | 6.8 |
2017-07-20 | CVE-2017-7015 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X An issue was discovered in certain Apple products. | 6.8 |
2017-07-20 | CVE-2017-7014 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X An issue was discovered in certain Apple products. | 9.3 |
2017-07-20 | CVE-2017-7013 | Out-of-bounds Read vulnerability in Apple products An issue was discovered in certain Apple products. | 6.8 |
2017-07-20 | CVE-2017-7010 | Out-of-bounds Read vulnerability in Apple products An issue was discovered in certain Apple products. | 6.8 |
2017-07-20 | CVE-2017-7009 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products An issue was discovered in certain Apple products. | 9.3 |
2017-07-20 | CVE-2017-7008 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS, mac OS X and Tvos An issue was discovered in certain Apple products. | 6.8 |
2017-07-13 | CVE-2017-9788 | Improper Input Validation vulnerability in multiple products In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. | 9.1 |
2017-07-13 | CVE-2017-11103 | Insufficient Verification of Data Authenticity vulnerability in multiple products Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. | 6.8 |