Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.12 vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2016-4745
The Kerberos 5 (aka krb5) PAM module in Apple OS X prior to 10.12 does not use constant-time operations for determining username validity, which makes it easier for remote malicious users to enumerate user accounts via a timing side-channel attack.
Apple Mac Os X
5.3
CVSSv3
CVE-2016-4713
CoreDisplay in Apple OS X prior to 10.12 allows malicious users to view arbitrary users' screens by leveraging screen-sharing access.
Apple Mac Os X
5.3
CVSSv3
CVE-2016-4748
Perl in Apple OS X prior to 10.12 allows local users to bypass the taint-mode protection mechanism via a crafted environment variable.
Apple Mac Os X
4
CVSSv3
CVE-2016-4707
CFNetwork in Apple iOS prior to 10 and OS X prior to 10.12 mishandles Local Storage deletion, which allows local users to discover the visited web sites of arbitrary users via unspecified vectors.
Apple Iphone Os
Apple Mac Os X
3.7
CVSSv3
CVE-2016-4739
mDNSResponder in Apple OS X prior to 10.12, when VMnet.framework is used, arranges for a DNS proxy to listen on all interfaces, which allows remote malicious users to obtain sensitive information by sending a DNS query to an unintended interface.
Apple Mac Os X
3.3
CVSSv3
CVE-2016-4715
The Date & Time Pref Pane component in Apple OS X prior to 10.12 mishandles the .GlobalPreferences file, which allows malicious users to discover a user's location via a crafted app.
Apple Mac Os X
3.3
CVSSv3
CVE-2016-4717
The File Bookmark component in Apple OS X prior to 10.12 mishandles scoped-bookmark file descriptors, which allows malicious users to cause a denial of service via a crafted app.
Apple Mac Os X
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6267
XML injection
CVE-2024-37673
CVE-2024-6266
CVE-2024-30078
arbitrary
CVE-2024-36886
CVE-2024-5346
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6