Vulnerabilities > Apple > MAC OS X > 10.7.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-07-03 | CVE-2015-3702 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, and CVE-2015-3701. | 7.2 |
2015-07-03 | CVE-2015-3701 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, and CVE-2015-3702. | 7.2 |
2015-07-03 | CVE-2015-3700 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3701, and CVE-2015-3702. | 7.2 |
2015-07-03 | CVE-2015-3699 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3700, CVE-2015-3701, and CVE-2015-3702. | 7.2 |
2015-07-03 | CVE-2015-3698 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3697, CVE-2015-3699, CVE-2015-3700, CVE-2015-3701, and CVE-2015-3702. | 7.2 |
2015-07-03 | CVE-2015-3697 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, CVE-2015-3701, and CVE-2015-3702. | 7.2 |
2015-07-03 | CVE-2015-3696 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, CVE-2015-3701, and CVE-2015-3702. | 7.2 |
2015-07-03 | CVE-2015-3695 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, CVE-2015-3701, and CVE-2015-3702. | 7.2 |
2015-07-03 | CVE-2015-3694 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS and mac OS X FontParser in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-3719. | 6.8 |
2015-07-03 | CVE-2015-3693 | 7PK - Security Features vulnerability in Apple mac OS X Apple Mac EFI before 2015-001, as used in OS X before 10.10.4 and other products, does not properly set refresh rates for DDR3 RAM, which might make it easier for remote attackers to conduct row-hammer attacks, and consequently gain privileges or cause a denial of service (memory corruption), by triggering certain patterns of access to memory locations. | 9.3 |