Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.7.3 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2011-3446
Apple Type Services (ATS) in Apple Mac OS X prior to 10.7.3 does not properly manage memory for data-font files, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted font that is accessed by Font Book.
Apple Mac Os X Server
Apple Mac Os X 10.7.1
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.7.0
Apple Mac Os X Server 10.7.1
Apple Mac Os X
6.8
CVSSv2
CVE-2011-3449
Use-after-free vulnerability in CoreText in Apple Mac OS X prior to 10.7.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted embedded font in a document.
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.7.0
Apple Mac Os X Server 10.7.1
Apple Mac Os X Server
Apple Mac Os X 10.7.1
Apple Mac Os X
6.8
CVSSv2
CVE-2012-3722
The Sorenson codec in QuickTime in Apple Mac OS X prior to 10.7.5, and in CoreMedia in iOS prior to 6, accesses uninitialized memory locations, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file ...
Apple Mac Os X 10.6.7
Apple Mac Os X 10.5.1
Apple Mac Os X 10.5.6
Apple Mac Os X 10.4.4
Apple Mac Os X 10.4.3
Apple Mac Os X 10.4
Apple Mac Os X 10.3.9
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.5
Apple Mac Os X 10.7.3
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X 10.5.7
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.2
Apple Mac Os X 10.6.0
Apple Mac Os X 10.5.3
Apple Mac Os X 10.6.4
Apple Mac Os X 10.5.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4040
privilege escalation
CVE-2024-4112
CVE-2024-32872
man-in-the-middle
CVE-2024-32788
bypass
CVE-2024-3400
CVE-2024-28976
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5