Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.8.4 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2014-1373
Intel Graphics Driver in Apple OS X prior to 10.9.4 does not properly restrict an unspecified OpenGL API call, which allows malicious users to execute arbitrary code via a crafted application.
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.4
Apple Mac Os X 10.9.1
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.9
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.9.2
890
VMScore
CVE-2014-1376
Intel Compute in Apple OS X prior to 10.9.4 does not properly restrict an unspecified OpenCL API call, which allows malicious users to execute arbitrary code via a crafted application.
Apple Mac Os X 10.8.5
Apple Mac Os X 10.9
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.9.2
Apple Mac Os X 10.8.0
Apple Mac Os X
Apple Mac Os X 10.9.1
890
VMScore
CVE-2014-1377
Array index error in IOAcceleratorFamily in Apple OS X prior to 10.9.4 allows malicious users to execute arbitrary code via a crafted application.
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.5
Apple Mac Os X 10.9.2
Apple Mac Os X
Apple Mac Os X 10.9
Apple Mac Os X 10.9.1
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.4
890
VMScore
CVE-2014-1379
Graphics Drivers in Apple OS X prior to 10.9.4 allows malicious users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a 32-bit executable file for a crafted application.
Apple Mac Os X 10.8.0
Apple Mac Os X
Apple Mac Os X 10.9.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X 10.9
Apple Mac Os X 10.9.2
890
VMScore
CVE-2014-1314
WindowServer in Apple OS X up to and including 10.9.2 does not prevent session creation by a sandboxed application, which allows malicious users to bypass the sandbox protection mechanism and execute arbitrary code via a crafted application.
Apple Mac Os X 10.9
Apple Mac Os X 10.9.1
Apple Mac Os X
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
890
VMScore
CVE-2014-1318
The Intel Graphics Driver in Apple OS X up to and including 10.9.2 does not properly validate a certain pointer, which allows malicious users to execute arbitrary code via a crafted application.
Apple Mac Os X 10.9
Apple Mac Os X
Apple Mac Os X 10.9.1
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
700
VMScore
CVE-2013-1775
sudo 1.6.0 up to and including 1.7.10p6 and sudo 1.8.0 up to and including 1.8.6p6 allows local users or physically proximate malicious users to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp t...
Todd Miller Sudo 1.6.9p21
Todd Miller Sudo 1.6.7p5
Todd Miller Sudo 1.6.1
Todd Miller Sudo 1.6.6
Todd Miller Sudo 1.6.9p22
Todd Miller Sudo 1.6.2p3
Todd Miller Sudo 1.6.4
Todd Miller Sudo 1.6.8p12
Todd Miller Sudo 1.6.2
Todd Miller Sudo 1.6.7
Todd Miller Sudo 1.6.9p23
Todd Miller Sudo 1.6.5
Todd Miller Sudo 1.6.3 P7
Todd Miller Sudo 1.6.9
Todd Miller Sudo 1.6.3
Todd Miller Sudo 1.6.4p2
Todd Miller Sudo 1.6.9p20
Todd Miller Sudo 1.6
Todd Miller Sudo 1.6.8
Todd Miller Sudo 1.8.1p2
Todd Miller Sudo 1.8.2
Todd Miller Sudo 1.8.4p3
2 EDB exploits
1 Github repository
668
VMScore
CVE-2014-1371
Array index error in Dock in Apple OS X prior to 10.9.4 allows malicious users to execute arbitrary code or cause a denial of service (incorrect function-pointer dereference and application crash) by leveraging access to a sandboxed application for sending a message.
Apple Mac Os X Server 10.7.4
Apple Mac Os X 10.7.0
Apple Mac Os X 10.7.2
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.9.2
Apple Mac Os X Server 10.7.0
Apple Mac Os X Server 10.7.1
Apple Mac Os X Server 10.7.2
Apple Mac Os X Server 10.7.3
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.9
Apple Mac Os X 10.7.3
Apple Mac Os X 10.7.4
Apple Mac Os X 10.7.5
Apple Mac Os X 10.8.0
Apple Mac Os X Server 10.7.5
Apple Mac Os X 10.7.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.4
Apple Mac Os X 10.9.1
668
VMScore
CVE-2014-1256
Buffer overflow in Apple Type Services (ATS) in Apple OS X prior to 10.9.2 allows malicious users to bypass the App Sandbox protection mechanism via crafted Mach messages.
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.3
Apple Mac Os X Server 10.7.1
Apple Mac Os X 10.7.2
Apple Mac Os X 10.7.4
Apple Mac Os X 10.8.1
Apple Mac Os X
Apple Mac Os X Server 10.7.3
Apple Mac Os X Server 10.7.4
Apple Mac Os X Server 10.7.5
Apple Mac Os X 10.7.0
Apple Mac Os X 10.7.1
Apple Mac Os X 10.9
Apple Mac Os X Server 10.7.0
Apple Mac Os X Server 10.7.2
Apple Mac Os X 10.7.3
Apple Mac Os X 10.7.5
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.0
668
VMScore
CVE-2013-5135
Format string vulnerability in Screen Sharing Server in Apple Mac OS X prior to 10.9 and Apple Remote Desktop prior to 3.5.4 allows remote malicious users to execute arbitrary code via format string specifiers in a VNC username.
Apple Apple Remote Desktop 3.0.0
Apple Apple Remote Desktop 3.1
Apple Apple Remote Desktop 3.2
Apple Apple Remote Desktop 3.3.2
Apple Apple Remote Desktop 3.4
Apple Apple Remote Desktop 3.5
Apple Apple Remote Desktop 3.5.1
Apple Apple Remote Desktop 3.2.2
Apple Apple Remote Desktop 3.3.1
Apple Apple Remote Desktop 3.5.2
Apple Apple Remote Desktop 3.2.1
Apple Apple Remote Desktop 3.3
Apple Apple Remote Desktop
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X
Apple Mac Os X 10.8.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »