Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.10.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-3683
The Bluetooth HCI interface implementation in Apple OS X prior to 10.10.4 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Apple Mac Os X
NA
CVE-2015-3684
The HTTPAuthentication implementation in CFNetwork in Apple iOS prior to 8.4 and OS X prior to 10.10.4 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted credentials in a URL.
Apple Mac Os X
Apple Iphone Os
NA
CVE-2015-3685
CoreText in Apple iOS prior to 8.4 and OS X prior to 10.10.4 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3686, CVE-2015-3687, CVE-2015-3688, and CVE-2015-...
Apple Iphone Os
Apple Mac Os X
NA
CVE-2015-3686
CoreText in Apple iOS prior to 8.4 and OS X prior to 10.10.4 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3687, CVE-2015-3688, and CVE-2015-...
Apple Iphone Os
Apple Itunes
Apple Mac Os X
NA
CVE-2015-3687
CoreText in Apple iOS prior to 8.4 and OS X prior to 10.10.4 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3688, and CVE-2015-...
Apple Iphone Os
Apple Itunes
Apple Mac Os X
NA
CVE-2015-3688
CoreText in Apple iOS prior to 8.4 and OS X prior to 10.10.4 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3687, and CVE-2015-...
Apple Itunes
Apple Mac Os X
Apple Iphone Os
NA
CVE-2015-3689
CoreText in Apple iOS prior to 8.4 and OS X prior to 10.10.4 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3687, and CVE-2015-...
Apple Mac Os X
Apple Iphone Os
NA
CVE-2015-3690
The DiskImages subsystem in Apple iOS prior to 8.4 and OS X prior to 10.10.4 allows malicious users to obtain sensitive memory-layout information for the kernel via a crafted app.
Apple Mac Os X
Apple Iphone Os
NA
CVE-2015-3691
The Monitor Control Command Set kernel extension in the Display Drivers subsystem in Apple OS X prior to 10.10.4 allows malicious users to execute arbitrary code in a privileged context via a crafted app that leverages control of a function pointer.
Apple Mac Os X
NA
CVE-2015-3692
Apple Mac EFI prior to 2015-001, as used in OS X prior to 10.10.4 and other products, does not enforce a locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging root privileges.
Apple Mac Os X
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »