Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.8.3 vulnerabilities and exploits
(subscribe to this query)
294
VMScore
CVE-2013-1031
Power Management in Apple Mac OS X prior to 10.8.5 does not properly perform locking upon occurrences of a power assertion, which allows physically proximate malicious users to bypass intended access restrictions by visiting an unattended workstation on which a locking failure ha...
Apple Mac Os X 10.8.3
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.1
490
VMScore
CVE-2013-1033
Screen Lock in Apple Mac OS X prior to 10.8.5 does not properly track sessions, which allows remote authenticated users to bypass locking by leveraging screen-sharing access.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
605
VMScore
CVE-2013-1027
Installer in Apple Mac OS X prior to 10.8.5 provides an option to continue a package's installation after encountering a revoked certificate, which might allow user-assisted remote malicious users to execute arbitrary code via a crafted package.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X
Apple Mac Os X 10.8.1
436
VMScore
CVE-2013-1029
The kernel in Apple Mac OS X prior to 10.8.5 allows remote malicious users to cause a denial of service (panic) via crafted IGMP packets that leverage incorrect, extraneous code in the IGMP parser.
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X
187
VMScore
CVE-2013-1030
mdmclient in Mobile Device Management in Apple Mac OS X prior to 10.8.5 places a password on the command line, which allows local users to obtain sensitive information by listing the process.
Apple Mac Os X 10.8.2
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
187
VMScore
CVE-2013-3952
The fill_pipeinfo function in bsd/kern/sys_pipe.c in the XNU kernel in Apple Mac OS X 10.8.x allows local users to defeat the KASLR protection mechanism via the PROC_PIDFDPIPEINFO option to the proc_info system call for a kernel pipe handle.
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.1
187
VMScore
CVE-2013-3949
The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs, which allows local users to bypass intended access restrictions via a wrapper progra...
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.1
605
VMScore
CVE-2013-1032
QuickTime in Apple Mac OS X prior to 10.8.5 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted idsc atom in a QuickTime movie file.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Quicktime
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.3
Apple Mac Os X
587
VMScore
CVE-2013-5163
Directory Services in Apple Mac OS X prior to 10.8.5 Supplemental Update allows local users to bypass password-based authentication and modify arbitrary Directory Services records via unspecified vectors.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X
Apple Mac Os X 10.8.4
231
VMScore
CVE-2013-5183
Mail in Apple Mac OS X prior to 10.9, when Kerberos authentication is enabled and TLS is disabled, sends invalid cleartext data, which allows remote malicious users to obtain sensitive information by sniffing the network.
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »