Vulnerabilities > Apple > MAC OS X > 10.3.5
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-08-16 | CVE-2015-3760 | Improper Input Validation vulnerability in Apple mac OS X dyld in Apple OS X before 10.10.5 does not properly validate pathnames in the environment, which allows local users to gain privileges via unspecified vectors. | 7.2 |
2015-08-16 | CVE-2015-3757 | Improper Access Control vulnerability in Apple mac OS X Apple OS X before 10.10.5 does not properly restrict access to the Date & Time preferences pane, which allows local users to spoof the time by visiting this pane. | 2.1 |
2015-08-16 | CVE-2013-7422 | Numeric Errors vulnerability in multiple products Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression. | 7.5 |
2015-08-14 | CVE-2015-1819 | Resource Management Errors vulnerability in multiple products The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack. | 5.0 |
2015-08-11 | CVE-2015-5523 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving multiple whitespace characters before an empty href, which triggers a large memory allocation. | 4.3 |
2015-08-11 | CVE-2015-5522 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Heap-based buffer overflow in the ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving a command character in an href. | 6.8 |
2015-07-03 | CVE-2015-3727 | Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS, mac OS X and Safari WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site. | 6.8 |
2015-07-03 | CVE-2015-3721 | Information Exposure vulnerability in Apple Iphone OS and mac OS X The kernel in Apple iOS before 8.4 and OS X before 10.10.4 does not properly handle HFS parameters, which allows attackers to obtain sensitive memory-layout information via a crafted app. | 4.3 |
2015-07-03 | CVE-2015-3720 | Information Exposure vulnerability in Apple mac OS X The kernel in Apple OS X before 10.10.4 does not properly manage memory in kernel-extension APIs, which allows attackers to obtain sensitive memory-layout information via a crafted app. | 4.3 |
2015-07-03 | CVE-2015-3719 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS and mac OS X TrueTypeScaler in FontParser in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-3694. | 6.8 |