Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.8.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-5170
Buffer underflow in CoreGraphics in Apple Mac OS X prior to 10.9 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
NA
CVE-2013-5171
CoreGraphics in Apple Mac OS X prior to 10.9 allows local users to bypass secure input mode and log an arbitrary application's keystrokes via a hotkey event registration.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.5
Apple Mac Os X
NA
CVE-2013-5173
The random-number generator in the kernel in Apple Mac OS X prior to 10.9 provides lengthy exclusive access for processing of large requests, which allows local users to cause a denial of service (temporary generator outage) via an application that requires many random numbers.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
NA
CVE-2013-5174
Integer signedness error in the kernel in Apple Mac OS X prior to 10.9 allows local users to cause a denial of service (system crash) via a crafted tty read operation.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
Apple Mac Os X
NA
CVE-2013-5175
The kernel in Apple Mac OS X prior to 10.9 allows local users to obtain sensitive information or cause a denial of service (out-of-bounds read and system crash) via a crafted Mach-O file.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
NA
CVE-2013-5176
The kernel in Apple Mac OS X prior to 10.9 does not properly handle integer values during unspecified tty device operations, which allows local users to cause a denial of service (system hang) by triggering a truncation error.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
NA
CVE-2013-5177
The kernel in Apple Mac OS X prior to 10.9 allows local users to cause a denial of service (panic) via an invalid iovec structure.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
NA
CVE-2013-5178
LaunchServices in Apple Mac OS X prior to 10.9 does not properly restrict Unicode characters in filenames, which allows context-dependent malicious users to spoof file extensions via a crafted character sequence.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X
NA
CVE-2013-5179
App Sandbox in Apple Mac OS X prior to 10.9 allows malicious users to bypass intended sandbox restrictions via a crafted app that uses the LaunchServices interface to specify process arguments.
Apple Mac Os X 10.8.0
Apple Mac Os X
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
NA
CVE-2013-5181
The auto-configuration feature in Mail in Apple Mac OS X prior to 10.9 selects plaintext authentication for unspecified servers that support CRAM-MD5 authentication, which allows remote malicious users to obtain sensitive information by sniffing the network.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »