U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
There are 3,171 matching records.
Displaying matches 2,741 through 2,760.
Vuln ID Summary CVSS Severity
CVE-2014-4440

The MCX Desktop Config Profiles implementation in Apple OS X before 10.10 retains web-proxy settings from uninstalled mobile-configuration profiles, which allows remote attackers to obtain sensitive information in opportunistic circumstances by leveraging access to an unintended proxy server.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 2.6 LOW
CVE-2014-4439

Mail in Apple OS X before 10.10 does not properly recognize the removal of a recipient address from a message, which makes it easier for remote attackers to obtain sensitive information in opportunistic circumstances by reading a message intended exclusively for other recipients.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 4.3 MEDIUM
CVE-2014-4438

Race condition in LoginWindow in Apple OS X before 10.10 allows physically proximate attackers to obtain access by leveraging an unattended workstation on which screen locking had been attempted.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 6.9 MEDIUM
CVE-2014-4437

LaunchServices in Apple OS X before 10.10 allows attackers to bypass intended sandbox restrictions via an application that specifies a crafted handler for the Content-Type field of an object.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2014-4436

IOHIDFamily in Apple OS X before 10.10 allows attackers to cause denial of service (out-of-bounds read operation) via a crafted application.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 4.3 MEDIUM
CVE-2014-4435

The "iCloud Find My Mac" feature in Apple OS X before 10.10 does not properly enforce rate limiting of lost-mode PIN entry, which makes it easier for physically proximate attackers to obtain access via a brute-force attack involving a series of reboots.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 4.4 MEDIUM
CVE-2014-4434

The kernel in Apple OS X before 10.10 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted filename on an HFS filesystem.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 4.9 MEDIUM
CVE-2014-4433

Heap-based buffer overflow in the kernel in Apple OS X before 10.10 allows physically proximate attackers to execute arbitrary code via crafted resource forks in an HFS filesystem.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-2014-4432

fdesetup in Apple OS X before 10.10 does not properly display the encryption status in between a setting-update action and a reboot action, which might make it easier for physically proximate attackers to obtain cleartext data by leveraging ignorance of the reboot requirement.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 4.7 MEDIUM
CVE-2014-4431

Dock in Apple OS X before 10.10 does not properly manage the screen-lock state, which allows physically proximate attackers to view windows by leveraging an unattended workstation.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2014-4430

CoreStorage in Apple OS X before 10.10 retains a volume's encryption keys upon an eject action in the unlocked state, which makes it easier for physically proximate attackers to obtain cleartext data via a remount.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 4.7 MEDIUM
CVE-2014-4428

Bluetooth in Apple OS X before 10.10 does not require encryption for HID Low Energy devices, which allows remote attackers to spoof a device by leveraging previous pairing.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 5.4 MEDIUM
CVE-2014-4427

App Sandbox in Apple OS X before 10.10 allows attackers to bypass a sandbox protection mechanism via the accessibility API.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2014-4426

AFP File Server in Apple OS X before 10.10 allows remote attackers to discover the network addresses of all interfaces via an unspecified command to one interface.

Published: October 17, 2014; 9:55:13 PM -0400
V3.x:(not available)
V2.0: 4.3 MEDIUM
CVE-2014-4425

CFPreferences in Apple OS X before 10.10 does not properly enforce the "require password after sleep or screen saver begins" setting, which makes it easier for physically proximate attackers to obtain access by leveraging an unattended workstation.

Published: October 17, 2014; 9:55:12 PM -0400
V3.x:(not available)
V2.0: 4.6 MEDIUM
CVE-2014-4417

Safari in Apple OS X before 10.10 allows remote attackers to cause a denial of service (universal Push Notification outage) via a web site that triggers an uncaught SafariNotificationAgent exception by providing a crafted Push Notification.

Published: October 17, 2014; 9:55:12 PM -0400
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-2014-4391

The Code Signing feature in Apple OS X before 10.10 does not properly handle incomplete resource envelopes in signed bundles, which allows remote attackers to bypass intended app-author restrictions by omitting an execution-related resource.

Published: October 17, 2014; 9:55:12 PM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2014-4351

Buffer overflow in QuickTime in Apple OS X before 10.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted audio samples in an m4a file.

Published: October 17, 2014; 9:55:12 PM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2014-3566

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

Published: October 14, 2014; 8:55:02 PM -0400
V3.1: 3.4 LOW
V2.0: 4.3 MEDIUM
CVE-2014-7185

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

Published: October 08, 2014; 1:55:05 PM -0400
V3.x:(not available)
V2.0: 6.4 MEDIUM