Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.7.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-3462
Time Machine in Apple Mac OS X prior to 10.7.3 does not verify the unique identifier of its remote AFP volume or Time Capsule, which allows remote malicious users to obtain sensitive information contained in new backups by spoofing this storage object, a different vulnerability t...
Apple Mac Os X 10.7.1
Apple Mac Os X
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.7.0
Apple Mac Os X Server 10.7.1
Apple Mac Os X Server
NA
CVE-2011-3448
Heap-based buffer overflow in CoreMedia in Apple Mac OS X prior to 10.7.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding.
Apple Mac Os X Server 10.7.1
Apple Mac Os X
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.6
Apple Mac Os X 10.6.8
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.6.6
Apple Mac Os X 10.6.0
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.3
Apple Mac Os X Server 10.6.8
Apple Mac Os X 10.7.1
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.2
Apple Mac Os X Server 10.6.3
Apple Mac Os X Server 10.7.0
Apple Mac Os X Server
Apple Mac Os X 10.6.5
Apple Mac Os X 10.6.7
NA
CVE-2011-3452
Internet Sharing in Apple Mac OS X prior to 10.7.3 does not preserve the Wi-Fi configuration across software updates, which allows remote malicious users to obtain sensitive information by leveraging the lack of a WEP password for a Wi-Fi network.
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.7.1
Apple Mac Os X Server
Apple Mac Os X
Apple Mac Os X 10.7.1
Apple Mac Os X Server 10.7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5