Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.8.3 vulnerabilities and exploits
(subscribe to this query)
6.6
CVSSv2
CVE-2013-5163
Directory Services in Apple Mac OS X prior to 10.8.5 Supplemental Update allows local users to bypass password-based authentication and modify arbitrary Directory Services records via unspecified vectors.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X
Apple Mac Os X 10.8.4
6.4
CVSSv2
CVE-2013-5165
socketfilterfw in Application Firewall in Apple Mac OS X prior to 10.9 does not properly implement the --blockApp option, which allows remote malicious users to bypass intended access restrictions via a network connection to an application for which blocking was configured.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X
Apple Mac Os X 10.8.5
6.4
CVSSv2
CVE-2013-0966
The Apple mod_hfs_apple module for the Apache HTTP Server in Apple Mac OS X prior to 10.8.3 does not properly handle ignorable Unicode characters, which allows remote malicious users to bypass intended directory authentication requirements via a crafted pathname in a URI.
Apple Mac Os X 10.6.8
Apple Mac Os X Server 10.6.8
Apple Mac Os X Server 10.7.2
Apple Mac Os X 10.7.5
Apple Mac Os X 10.7.4
Apple Mac Os X Server 10.7.4
Apple Mac Os X 10.7.1
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.7.0
Apple Mac Os X 10.7.3
Apple Mac Os X Server 10.7.1
Apple Mac Os X Server 10.7.5
Apple Mac Os X Server 10.7.3
Apple Mac Os X 10.7.2
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
5.8
CVSSv2
CVE-2013-5189
Apple Mac OS X prior to 10.9 does not preserve a certain administrative system-preferences setting across software updates, which allows context-dependent malicious users to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended security co...
Apple Mac Os X 10.8.4
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.5
5.8
CVSSv2
CVE-2013-1028
The IPSec implementation in Apple Mac OS X prior to 10.8.5, when Hybrid Auth is used, does not verify X.509 certificates from security gateways, which allows man-in-the-middle malicious users to spoof security gateways and obtain sensitive information via a crafted certificate.
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 6.1
Apple Iphone Os 6.1.2
Apple Iphone Os
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
5.7
CVSSv2
CVE-2013-5184
The kernel in Apple Mac OS X prior to 10.9 does not properly check for errors during the processing of multicast Wi-Fi packets, which allows remote malicious users to cause a denial of service (system crash) by leveraging presence in an 802.11 network's coverage area.
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X
5.5
CVSSv2
CVE-2013-1033
Screen Lock in Apple Mac OS X prior to 10.8.5 does not properly track sessions, which allows remote authenticated users to bypass locking by leveraging screen-sharing access.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
5
CVSSv2
CVE-2014-4453
Apple iOS prior to 8.1.1 and OS X prior to 10.10.1 include location data during establishment of a Spotlight Suggestions server connection by Spotlight or Safari, which might allow remote malicious users to obtain sensitive information via unspecified vectors.
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Mac Os X
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.4
Apple Mac Os X 10.7.3
Apple Mac Os X 10.7.2
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.3
Apple Mac Os X 10.5.4
Apple Mac Os X 10.5.3
Apple Mac Os X 10.4.7
Apple Mac Os X 10.4.6
Apple Mac Os X 10.4.1
Apple Mac Os X 10.4.0
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.2
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.4
Apple Mac Os X 10.1.4
5
CVSSv2
CVE-2014-4458
The "System Profiler About This Mac" component in Apple OS X prior to 10.10.1 includes extraneous cookie data in system-model requests, which might allow remote malicious users to obtain sensitive information via unspecified vectors.
Apple Mac Os X
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.4
Apple Mac Os X 10.7.3
Apple Mac Os X 10.7.2
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.3
Apple Mac Os X 10.5.4
Apple Mac Os X 10.5.3
Apple Mac Os X 10.4.7
Apple Mac Os X 10.4.6
Apple Mac Os X 10.4.1
Apple Mac Os X 10.4.0
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.2
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.4
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.3
Apple Mac Os X 10.9.3
Apple Mac Os X 10.9.2
Apple Mac Os X 10.8.1
5
CVSSv2
CVE-2013-5178
LaunchServices in Apple Mac OS X prior to 10.9 does not properly restrict Unicode characters in filenames, which allows context-dependent malicious users to spoof file extensions via a crafted character sequence.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »