Vulnerabilities > Apple

DATE CVE VULNERABILITY TITLE RISK
2014-03-14 CVE-2013-5133 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
Backup in Apple iOS before 7.1 does not properly restrict symlinks, which allows remote attackers to overwrite files during a restore operation via crafted backup data.
network
apple CWE-264
8.8
2014-03-12 CVE-2014-0504 Information Exposure vulnerability in Adobe Flash Player
Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows attackers to read the clipboard via unspecified vectors.
network
low complexity
adobe linux apple microsoft CWE-200
5.0
2014-03-12 CVE-2014-0503 Permissions, Privileges, and Access Controls vulnerability in Adobe Flash Player
Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
network
low complexity
adobe linux apple microsoft CWE-264
6.4
2014-03-11 CVE-2014-0106 Improper Input Validation vulnerability in multiple products
Sudo 1.6.9 before 1.8.5, when env_reset is disabled, does not properly check environment variables for the env_delete restriction, which allows local users with sudo permissions to bypass intended command restrictions via a crafted environment variable.
6.6
2014-03-05 CVE-2014-2234 Improper Input Validation vulnerability in Apple mac OS X
A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and earlier uses a Trust Evaluation Agent (TEA) feature without terminating certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify callback function's documentation, which allows remote attackers to bypass extra verification within a custom application via a crafted certificate chain that is acceptable to TEA but not acceptable to that application.
network
low complexity
apple CWE-20
6.4
2014-03-01 CVE-2014-1912 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
network
low complexity
python apple CWE-119
7.5
2014-02-27 CVE-2014-1270 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple products
WebKit, as used in Apple Safari before 6.1.2 and 7.x before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1268 and CVE-2014-1269.
network
apple CWE-119
6.8
2014-02-27 CVE-2014-1269 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple products
WebKit, as used in Apple Safari before 6.1.2 and 7.x before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1268 and CVE-2014-1270.
network
apple CWE-119
6.8
2014-02-27 CVE-2014-1268 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple products
WebKit, as used in Apple Safari before 6.1.2 and 7.x before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1269 and CVE-2014-1270.
network
apple CWE-119
6.8
2014-02-27 CVE-2014-1265 Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X and mac OS X Server
The systemsetup program in the Date and Time subsystem in Apple OS X before 10.9.2 allows local users to bypass intended access restrictions by changing the current time on the system clock.
local
low complexity
apple CWE-264
4.6