Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphoto vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-0043
Format string vulnerability in Apple iPhoto prior to 7.1.2 allows remote malicious users to execute arbitrary code via photocast subscriptions.
Apple Iphoto
6.8
CVSSv2
CVE-2007-0051
Format string vulnerability in Apple iPhoto 6.0.5 (316), and other versions prior to 6.0.6, allows remote user-assisted malicious users to execute arbitrary code via a crafted photocast with format string specifiers in the title of an RSS iPhoto feed.
Apple Iphoto 6.0.5
1 EDB exploit
6.8
CVSSv2
CVE-2007-0645
Format string vulnerability in iPhoto 6.0.5 allows remote user-assisted malicious users to cause a denial of service (crash) via format string specifiers in a filename, which is not properly handled when calling certain Apple AppKit functions.
Apple Iphoto 6.0.5
1 EDB exploit
7.5
CVSSv2
CVE-2008-0830
The Digital Photo Access Protocol (DPAP) server for iPhoto 4.0.3 allows remote malicious users to cause a denial of service (crash) via a malformed dpap: URI, a different vulnerability than CVE-2008-0043.
Apple Iphoto 4.0.3
1 EDB exploit
6.8
CVSSv2
CVE-2008-0987
Stack-based buffer overflow in Image Raw in Apple Mac OS X 10.5.2, and Digital Camera RAW Compatibility before Update 2.0 for Aperture 2 and iPhoto 7.1.2, allows remote malicious users to execute arbitrary code via a crafted Adobe Digital Negative (DNG) image.
Apple Aperture 2
Apple Iphoto 7.1.2
5.1
CVSSv2
CVE-2006-0392
Buffer overflow in Apple Mac OS X 10.4.7 allows user-assisted malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Canon RAW image.
Apple Mac Os X 10.4.7
Apple Mac Os X Server 10.4.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started