Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.1.4 vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2002-0676
SoftwareUpdate for MacOS 10.1.x does not use authentication when downloading a software update, which could allow remote malicious users to execute arbitrary code by posing as the Apple update server via techniques such as DNS spoofing or cache poisoning, and supplying Trojan Hor...
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1
Apple Mac Os X 10.1.5
1 EDB exploit
187
VMScore
CVE-2001-1565
Point to Point Protocol daemon (pppd) in MacOS x 10.0 and 10.1 up to and including 10.1.5 provides the username and password on the command line, which allows local users to obtain authentication information via the ps command.
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.5
Apple Mac Os X 10.0
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.4
445
VMScore
CVE-2002-2326
The default configuration of Mail.app in Mac OS X 10.0 up to and including 10.0.4 and 10.1 up to and including 10.1.5 sends iDisk authentication credentials in cleartext when connecting to Mac.com, which could allow remote malicious users to obtain passwords by sniffing network t...
Apple Mac Os X 10.0
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.0.2
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1
Apple Mac Os X 10.0.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.3
445
VMScore
CVE-2004-0165
Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and previous versions allows remote malicious users to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X Server 10.1
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X Server 10.1.1
Apple Mac Os X Server 10.1.2
Apple Mac Os X Server 10.2.3
Apple Mac Os X Server 10.2.4
Apple Mac Os X Server 10.3.2
Apple Mac Os X 10.2
Apple Mac Os X 10.2.1
409
VMScore
CVE-2003-0877
Mac OS X prior to 10.3 with core files enabled allows local users to overwrite arbitrary files and read core files via a symlink attack on core files that are created with predictable names in the /cores directory.
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.4
Apple Mac Os X 10.2
Apple Mac Os X 10.2.1
Apple Mac Os X 10.0.1
Apple Mac Os X 10.0.2
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.8
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.0
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
641
VMScore
CVE-2003-1011
Apple Mac OS X 10.0 up to and including 10.2.8 allows local users with a USB keyboard to gain unauthorized access by holding down the CTRL and C keys when the system is booting, which crashes the init process and leaves the user in a root shell.
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.0.2
Apple Mac Os X 10.0.3
Apple Mac Os X 10.1.5
Apple Mac Os X 10.2
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.8
Apple Mac Os X 10.0
Apple Mac Os X 10.0.1
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.2.4
570
VMScore
CVE-2003-0198
Mac OS X prior to 10.2.5 allows guest users to modify the permissions of the DropBox folder and read unauthorized files.
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1.1
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.3
Apple Mac Os X Server 10.2.4
Apple Mac Os X 10.0
Apple Mac Os X 10.0.1
Apple Mac Os X 10.0.2
Apple Mac Os X Server 10.0
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.2.3
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.0.3
Apple Mac Os X 10.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.4
725
VMScore
CVE-2003-0171
DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.
Apple Mac Os X 10.0.2
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1.4
Apple Mac Os X 10.2
Apple Mac Os X 10.2.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.3
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.0
Apple Mac Os X 10.2.3
Apple Mac Os X 10.2.4
Apple Mac Os X Server 10.0
Apple Mac Os X Server 10.2
Apple Mac Os X 10.0.1
Apple Mac Os X 10.0.3
Apple Mac Os X 10.1.5
Apple Mac Os X 10.2.1
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.2.4
1 EDB exploit
320
VMScore
CVE-2005-1430
Mac OS X 10.3.x and previous versions uses insecure permissions for a pseudo terminal tty (pty) that is managed by a non-setuid program, which allows local users to read or modify sessions of other users.
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X Server 10.1.5
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.3.7
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.9
Apple Mac Os X 10.2
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.9
Apple Mac Os X Server 10.0
676
VMScore
CVE-2005-0970
Mac OS X 10.3.9 and previous versions allows users to install, create, and execute setuid/setgid scripts, contrary to the intended design, which may allow malicious users to conduct unauthorized activities with escalated privileges via vulnerable scripts.
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X 10.0
Apple Mac Os X 10.0.1
Apple Mac Os X 10.0.2
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.2.7
Apple Mac Os X 10.3.6
Apple Mac Os X 10.3.7
Apple Mac Os X 10.0.3
Apple Mac Os X 10.1
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.3
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »