Vulnerabilities > Apple

DATE CVE VULNERABILITY TITLE RISK
2015-03-18 CVE-2015-1068 Resource Management Errors vulnerability in Apple products
WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
network
apple CWE-399
6.8
2015-03-13 CVE-2015-0342 Use After Free Remote Code Execution vulnerability in Adobe Flash Player
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0341.
network
low complexity
adobe linux apple microsoft
critical
10.0
2015-03-13 CVE-2015-0341 Use After Free Remote Code Execution vulnerability in Adobe Flash Player
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0342.
network
low complexity
adobe linux apple microsoft
critical
10.0
2015-03-13 CVE-2015-0340 File Upload Restriction Security Bypass vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows remote attackers to bypass intended file-upload restrictions via unspecified vectors.
network
low complexity
adobe linux apple microsoft
5.0
2015-03-13 CVE-2015-0339 Resource Management Errors vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0335.
network
low complexity
adobe linux apple microsoft CWE-399
critical
10.0
2015-03-13 CVE-2015-0338 Remote Integer Overflow vulnerability in Adobe Flash Player
Integer overflow in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors.
network
low complexity
adobe linux apple microsoft
critical
10.0
2015-03-13 CVE-2015-0337 Permissions, Privileges, and Access Controls vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
network
low complexity
adobe linux apple microsoft CWE-264
5.0
2015-03-13 CVE-2015-0336 Type Confusion Remote Code Execution vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0334.
network
adobe apple microsoft linux
critical
9.3
2015-03-13 CVE-2015-0335 Resource Management Errors vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0339.
network
low complexity
adobe apple microsoft linux CWE-399
critical
10.0
2015-03-13 CVE-2015-0334 Type Confusion Remote Code Execution vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0336.
network
adobe apple microsoft linux
critical
9.3