Vulnerabilities > Apple > MAC OS X

DATE CVE VULNERABILITY TITLE RISK
2014-07-01 CVE-2014-1358 Numeric Errors vulnerability in Apple Iphone OS, mac OS X and Tvos
Integer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application.
network
low complexity
apple CWE-189
critical
10.0
2014-07-01 CVE-2014-1357 Buffer Errors vulnerability in Apple Iphone OS, mac OS X and Tvos
Heap-based buffer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application that generates log messages.
network
low complexity
apple CWE-119
critical
10.0
2014-07-01 CVE-2014-1356 Buffer Errors vulnerability in Apple Iphone OS, mac OS X and Tvos
Heap-based buffer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application that sends IPC messages.
network
low complexity
apple CWE-119
critical
10.0
2014-07-01 CVE-2014-1355 Unspecified vulnerability in Apple Iphone OS, mac OS X and Tvos
The IOKit implementation in the kernel in Apple iOS before 7.1.2 and Apple TV before 6.1.2, and in IOReporting in Apple OS X before 10.9.4, allows local users to cause a denial of service (NULL pointer dereference and reboot) via crafted API arguments.
local
low complexity
apple
4.9
2014-07-01 CVE-2014-1317 Information Exposure vulnerability in Apple mac OS X
iBooks Commerce in Apple OS X before 10.9.4 places Apple ID credentials in the iBooks log, which allows local users to obtain sensitive information by reading this file.
local
low complexity
apple CWE-200
2.1
2014-06-21 CVE-2014-3431 Permissions, Privileges, and Access Controls vulnerability in Symantec Encryption Desktop and PGP Desktop
Symantec PGP Desktop 10.x, and Encryption Desktop Professional 10.3.x before 10.3.2 MP2, on OS X uses world-writable permissions for temporary files, which allows local users to bypass intended restrictions on file reading, modification, creation, and permission changes via unspecified vectors.
local
low complexity
symantec apple CWE-264
4.3
2014-06-11 CVE-2014-1539 Improper Input Validation vulnerability in Mozilla Firefox and Thunderbird
Mozilla Firefox before 30.0 and Thunderbird through 24.6 on OS X do not ensure visibility of the cursor after interaction with a Flash object and a DIV element, which makes it easier for remote attackers to conduct clickjacking attacks via JavaScript code that produces a fake cursor image.
network
low complexity
mozilla apple CWE-20
5.0
2014-06-11 CVE-2014-0536 Buffer Errors vulnerability in Adobe Air, Adobe AIR SDK and Flash Player
Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK & Compiler before 14.0.0.110 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
network
low complexity
adobe linux apple microsoft CWE-119
critical
10.0
2014-06-11 CVE-2014-0535 Permissions, Privileges, and Access Controls vulnerability in Adobe Air, Adobe AIR SDK and Flash Player
Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK & Compiler before 14.0.0.110 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0534.
network
low complexity
adobe linux apple microsoft CWE-264
7.5
2014-06-11 CVE-2014-0534 Permissions, Privileges, and Access Controls vulnerability in Adobe Air, Adobe AIR SDK and Flash Player
Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK & Compiler before 14.0.0.110 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0535.
network
low complexity
adobe apple microsoft linux CWE-264
7.5