Vulnerabilities > Apple > MAC OS X > 10.9.5

DATE CVE VULNERABILITY TITLE RISK
2017-07-20 CVE-2017-7017 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X
An issue was discovered in certain Apple products.
network
apple CWE-119
critical
9.3
2017-07-20 CVE-2017-7016 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X
An issue was discovered in certain Apple products.
network
apple CWE-119
6.8
2017-07-20 CVE-2017-7015 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X
An issue was discovered in certain Apple products.
network
apple CWE-119
6.8
2017-07-20 CVE-2017-7014 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple mac OS X
An issue was discovered in certain Apple products.
network
apple CWE-119
critical
9.3
2017-07-20 CVE-2017-7013 Out-of-bounds Read vulnerability in Apple products
An issue was discovered in certain Apple products.
6.8
2017-07-20 CVE-2017-7010 Out-of-bounds Read vulnerability in Apple products
An issue was discovered in certain Apple products.
6.8
2017-07-20 CVE-2017-7009 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
An issue was discovered in certain Apple products.
network
apple CWE-119
critical
9.3
2017-07-20 CVE-2017-7008 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS, mac OS X and Tvos
An issue was discovered in certain Apple products.
network
apple CWE-119
6.8
2017-07-13 CVE-2017-9788 Improper Input Validation vulnerability in multiple products
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest.
network
low complexity
apache debian apple netapp redhat oracle CWE-20
critical
9.1
2017-07-13 CVE-2017-11103 Insufficient Verification of Data Authenticity vulnerability in multiple products
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification.
6.8