Vulnerabilities > Apple

DATE CVE VULNERABILITY TITLE RISK
2017-07-20 CVE-2017-7006 Information Exposure Through Discrepancy vulnerability in Apple products
An issue was discovered in certain Apple products.
network
high complexity
apple CWE-203
2.6
2017-07-20 CVE-2017-2517 Improper Input Validation vulnerability in Apple Iphone OS
An issue was discovered in certain Apple products.
network
apple CWE-20
4.3
2017-07-17 CVE-2017-2241 SQL Injection vulnerability in Hammock Assetview 9.2
SQL injection vulnerability in the AssetView for MacOS Ver.9.2.0 and earlier versions allows remote attackers to execute arbitrary SQL commands via "File Transfer Web Service".
network
low complexity
hammock apple CWE-89
6.5
2017-07-17 CVE-2017-2240 Path Traversal vulnerability in Hammock Assetview 9.2
Directory traversal vulnerability in AssetView for MacOS Ver.9.2.0 and earlier versions allows remote attackers to read arbitrary files via "File Transfer Web Service".
network
low complexity
hammock apple CWE-22
4.0
2017-07-13 CVE-2017-9788 Improper Input Validation vulnerability in multiple products
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest.
network
low complexity
apache debian apple netapp redhat oracle CWE-20
critical
9.1
2017-07-13 CVE-2017-7529 Integer Overflow or Wraparound vulnerability in multiple products
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
network
low complexity
f5 puppet apple CWE-190
5.0
2017-07-13 CVE-2017-11103 Insufficient Verification of Data Authenticity vulnerability in multiple products
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification.
6.8
2017-07-07 CVE-2017-2218 Untrusted Search Path vulnerability in Apple Quicktime
Untrusted search path vulnerability in Installer of QuickTime for Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
6.8
2017-06-27 CVE-2017-2491 Use After Free vulnerability in Apple Iphone OS
Use after free vulnerability in the String.replace method JavaScriptCore in Apple Safari in iOS before 10.3 allows remote attackers to execute arbitrary code via a crafted web page, or a crafted file.
network
apple CWE-416
6.8
2017-06-20 CVE-2017-3082 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Flash Player
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the LocaleID class.
network
low complexity
adobe microsoft apple google linux CWE-119
critical
10.0