Vulnerabilities > Apple > Medium

DATE CVE VULNERABILITY TITLE RISK
2014-12-10 CVE-2014-4465 Improper Input Validation vulnerability in Apple Iphone OS, Safari and Tvos
WebKit in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1 allows remote attackers to bypass the Same Origin Policy via crafted Cascading Style Sheets (CSS) token sequences within an SVG file in the SRC attribute of an IMG element.
network
low complexity
apple CWE-20
5.0
2014-11-18 CVE-2014-3620 Cryptographic Issues vulnerability in multiple products
cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
network
low complexity
haxx apple CWE-310
5.0
2014-11-18 CVE-2014-3613 Cryptographic Issues vulnerability in multiple products
cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
network
low complexity
haxx apple CWE-310
5.0
2014-11-18 CVE-2014-4462 Resource Management Errors vulnerability in Apple Iphone OS and Tvos
WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452.
low complexity
apple CWE-399
5.8
2014-11-18 CVE-2014-4459 Memory Corruption vulnerability in WebKit
Use-after-free vulnerability in WebKit, as used in Apple OS X before 10.10.1, allows remote attackers to execute arbitrary code via crafted page objects in an HTML document.
network
apple
6.8
2014-11-18 CVE-2014-4458 Information Exposure vulnerability in Apple mac OS X
The "System Profiler About This Mac" component in Apple OS X before 10.10.1 includes extraneous cookie data in system-model requests, which might allow remote attackers to obtain sensitive information via unspecified vectors.
network
low complexity
apple CWE-200
5.0
2014-11-18 CVE-2014-4453 Information Exposure vulnerability in Apple Iphone OS and mac OS X
Apple iOS before 8.1.1 and OS X before 10.10.1 include location data during establishment of a Spotlight Suggestions server connection by Spotlight or Safari, which might allow remote attackers to obtain sensitive information via unspecified vectors.
network
low complexity
apple CWE-200
5.0
2014-11-18 CVE-2014-4452 Resource Management Errors vulnerability in Apple products
WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4462.
5.4
2014-11-15 CVE-2014-3707 Information Exposure vulnerability in multiple products
The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
4.3
2014-11-11 CVE-2014-8437 Information Exposure vulnerability in Adobe products
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow remote attackers to discover session tokens via unspecified vectors.
network
low complexity
adobe apple microsoft linux CWE-200
5.0