Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x server 10.5.3 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-1575
Unspecified vulnerability in the Apple Type Services (ATS) server in Apple Mac OS X 10.5 prior to 10.5.3 allows user-assisted remote malicious users to execute arbitrary code via a crafted embedded font in a PDF document, related to memory corruption that occurs during printing.
Apple Mac Os X Server 10.5.2
Apple Mac Os X Server 10.5
Apple Mac Os X Server 10.5.1
Apple Mac Os X 10.5
Apple Mac Os X 10.5.1
Apple Mac Os X 10.5.2
9.3
CVSSv2
CVE-2008-1577
Unspecified vulnerability in the Pixlet codec in Apple Pixlet Video in Apple Mac OS X prior to 10.5.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file, related to "multiple memory corruption iss...
Apple Mac Os X Server 10.4.11
Apple Mac Os X Server 10.5
Apple Mac Os X 10.4.11
Apple Mac Os X 10.5
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.5.2
Apple Mac Os X 10.5.1
Apple Mac Os X 10.5.2
9
CVSSv2
CVE-2010-0510
Password Server in Apple Mac OS X Server prior to 10.6.3 does not properly perform password replication, which might allow remote authenticated users to obtain login access via an expired password.
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server
Apple Mac Os X Server 10.5.8
Apple Mac Os X Server 10.5.7
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.5.3
Apple Mac Os X Server 10.5.2
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.5.0
Apple Mac Os X Server 10.5
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.5.6
Apple Mac Os X Server 10.5.4
7.8
CVSSv2
CVE-2010-0500
Event Monitor in Apple Mac OS X prior to 10.6.3 does not properly validate hostnames of SSH clients, which allows remote malicious users to cause a denial of service (arbitrary client blacklisting) via a crafted DNS PTR record, related to a "plist injection issue."
Apple Mac Os X 10.5.3
Apple Mac Os X 10.5.2
Apple Mac Os X 10.5.1
Apple Mac Os X 10.5.0
Apple Mac Os X
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server
Apple Mac Os X 10.5.8
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.5.4
Apple Mac Os X Server 10.5.3
Apple Mac Os X Server 10.5.2
Apple Mac Os X 10.6.1
Apple Mac Os X 10.5.6
Apple Mac Os X 10.5.4
Apple Mac Os X 10.5
Apple Mac Os X Server 10.5.7
Apple Mac Os X Server 10.5.0
Apple Mac Os X 10.6.0
Apple Mac Os X 10.5.7
Apple Mac Os X 10.5.5
7.8
CVSSv2
CVE-2009-2190
launchd in Apple Mac OS X 10.5 prior to 10.5.8 allows remote malicious users to cause a denial of service (individual service outage) by making many connections to an inetd-based launchd service.
Apple Mac Os X 10.5.6
Apple Mac Os X 10.5
Apple Mac Os X 10.5.5
Apple Mac Os X Server 10.5
Apple Mac Os X Server 10.5.6
Apple Mac Os X 10.5.7
Apple Mac Os X 10.5.2
Apple Mac Os X Server 10.5.2
Apple Mac Os X Server 10.5.3
Apple Mac Os X 10.5.3
Apple Mac Os X 10.5.4
Apple Mac Os X Server 10.5.4
Apple Mac Os X Server 10.5.5
Apple Mac Os X 10.5.0
Apple Mac Os X 10.5.1
Apple Mac Os X Server 10.5.0
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.5.7
7.8
CVSSv2
CVE-2007-6276
The accept_connections function in the virtual private network daemon (vpnd) in Apple Mac OS X 10.5 prior to 10.5.4 allows remote malicious users to cause a denial of service (divide-by-zero error and daemon crash) via a crafted load balancing packet to UDP port 4112.
Apple Mac Os X 10.5.2
Apple Mac Os X 10.5.3
Apple Mac Os X Server 10.5.2
Apple Mac Os X Server 10.5.3
Apple Mac Os X Server 10.5
Apple Mac Os X Server 10.5.1
Apple Mac Os X 10.5
Apple Mac Os X 10.5.1
1 EDB exploit
7.6
CVSSv2
CVE-2011-1516
The kSBXProfileNoNetwork and kSBXProfileNoInternet sandbox profiles in Apple Mac OS X 10.5.x up to and including 10.7.x do not propagate restrictions to all created processes, which allows remote malicious users to access network resources via a crafted application, as demonstrat...
Apple Mac Os X 10.5.1
Apple Mac Os X 10.5.2
Apple Mac Os X 10.6.0
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.8
Apple Mac Os X 10.7.0
Apple Mac Os X 10.5.0
Apple Mac Os X 10.5.7
Apple Mac Os X 10.5.8
Apple Mac Os X 10.6.6
Apple Mac Os X 10.6.7
Apple Mac Os X 10.5.3
Apple Mac Os X 10.5.4
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.3
Apple Mac Os X 10.7.1
Apple Mac Os X 10.7.2
Apple Mac Os X 10.5.5
Apple Mac Os X 10.5.6
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.5
1 EDB exploit
7.6
CVSSv2
CVE-2011-3213
The File Systems component in Apple Mac OS X prior to 10.7.2 does not properly track the specific X.509 certificate that a user manually accepted for an initial https WebDAV connection, which allows man-in-the-middle malicious users to hijack WebDAV communication by presenting an...
Apple Mac Os X 10.6.7
Apple Mac Os X 10.6.6
Apple Mac Os X Server 10.5.7
Apple Mac Os X Server 10.5.6
Apple Mac Os X Server 10.5
Apple Mac Os X Server 10.4.9
Apple Mac Os X Server 10.4.2
Apple Mac Os X Server 10.4.11
Apple Mac Os X Server 10.3.6
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.2.8
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.2.0
Apple Mac Os X Server 10.6.7
Apple Mac Os X Server 10.6.6
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.5.8
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.5.0
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.4.3
Apple Mac Os X Server 10.3.8
7.6
CVSSv2
CVE-2008-3610
Race condition in Login Window in Apple Mac OS X 10.5 up to and including 10.5.4, when a blank-password account is enabled, allows malicious users to bypass password authentication and login to any account via multiple attempts to login to the blank-password account, followed by ...
Apple Mac Os X 10.5.3
Apple Mac Os X 10.5
Apple Mac Os X Server 10.5
Apple Mac Os X Server 10.5.1
Apple Mac Os X 10.5.1
Apple Mac Os X Server 10.5.4
Apple Mac Os X Server 10.5.3
Apple Mac Os X 10.5.4
Apple Mac Os X Server 10.5.2
Apple Mac Os X 10.5.2
7.6
CVSSv2
CVE-2008-2311
Launch Services in Apple Mac OS X prior to 10.5, when Open Safe Files is enabled, allows remote malicious users to execute arbitrary code via a symlink attack, probably related to a race condition and automatic execution of a downloaded file.
Apple Mac Os X 10.4.3
Apple Mac Os X 10.4.4
Apple Mac Os X 10.5.2
Apple Mac Os X 10.5.3
Apple Mac Os X 10.4.11
Apple Mac Os X 10.4.2
Apple Mac Os X 10.5
Apple Mac Os X 10.5.1
Apple Mac Os X Server 10.4.3
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.5.2
Apple Mac Os X 10.4.5
Apple Mac Os X 10.4.6
Apple Mac Os X 10.4.7
Apple Mac Os X Server 10.4.1
Apple Mac Os X Server 10.4.10
Apple Mac Os X Server 10.4.7
Apple Mac Os X Server 10.4.8
Apple Mac Os X Server 10.4.5
Apple Mac Os X Server 10.4.6
Apple Mac Os X Server 10.5.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »