Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.1.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0676
SoftwareUpdate for MacOS 10.1.x does not use authentication when downloading a software update, which could allow remote malicious users to execute arbitrary code by posing as the Apple update server via techniques such as DNS spoofing or cache poisoning, and supplying Trojan Hor...
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1
Apple Mac Os X 10.1.5
1 EDB exploit
NA
CVE-2001-1565
Point to Point Protocol daemon (pppd) in MacOS x 10.0 and 10.1 up to and including 10.1.5 provides the username and password on the command line, which allows local users to obtain authentication information via the ps command.
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.5
Apple Mac Os X 10.0
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.4
NA
CVE-2002-2326
The default configuration of Mail.app in Mac OS X 10.0 up to and including 10.0.4 and 10.1 up to and including 10.1.5 sends iDisk authentication credentials in cleartext when connecting to Mac.com, which could allow remote malicious users to obtain passwords by sniffing network t...
Apple Mac Os X 10.0
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.0.2
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1
Apple Mac Os X 10.0.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.3
NA
CVE-2004-0165
Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and previous versions allows remote malicious users to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X Server 10.1
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X Server 10.1.1
Apple Mac Os X Server 10.1.2
Apple Mac Os X Server 10.2.3
Apple Mac Os X Server 10.2.4
Apple Mac Os X Server 10.3.2
Apple Mac Os X 10.2
Apple Mac Os X 10.2.1
NA
CVE-2003-1011
Apple Mac OS X 10.0 up to and including 10.2.8 allows local users with a USB keyboard to gain unauthorized access by holding down the CTRL and C keys when the system is booting, which crashes the init process and leaves the user in a root shell.
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.0.2
Apple Mac Os X 10.0.3
Apple Mac Os X 10.1.5
Apple Mac Os X 10.2
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.8
Apple Mac Os X 10.0
Apple Mac Os X 10.0.1
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.2.4
NA
CVE-2003-0877
Mac OS X prior to 10.3 with core files enabled allows local users to overwrite arbitrary files and read core files via a symlink attack on core files that are created with predictable names in the /cores directory.
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.4
Apple Mac Os X 10.2
Apple Mac Os X 10.2.1
Apple Mac Os X 10.0.1
Apple Mac Os X 10.0.2
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.8
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.0
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
NA
CVE-2003-0198
Mac OS X prior to 10.2.5 allows guest users to modify the permissions of the DropBox folder and read unauthorized files.
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1.1
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.3
Apple Mac Os X Server 10.2.4
Apple Mac Os X 10.0
Apple Mac Os X 10.0.1
Apple Mac Os X 10.0.2
Apple Mac Os X Server 10.0
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.2.3
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.0.3
Apple Mac Os X 10.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.4
NA
CVE-2003-0171
DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.
Apple Mac Os X 10.0.2
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1.4
Apple Mac Os X 10.2
Apple Mac Os X 10.2.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.3
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.0
Apple Mac Os X 10.2.3
Apple Mac Os X 10.2.4
Apple Mac Os X Server 10.0
Apple Mac Os X Server 10.2
Apple Mac Os X 10.0.1
Apple Mac Os X 10.0.3
Apple Mac Os X 10.1.5
Apple Mac Os X 10.2.1
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.2.4
1 EDB exploit
NA
CVE-2005-1430
Mac OS X 10.3.x and previous versions uses insecure permissions for a pseudo terminal tty (pty) that is managed by a non-setuid program, which allows local users to read or modify sessions of other users.
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1
Apple Mac Os X 10.1.1
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X Server 10.1.5
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.3.7
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.9
Apple Mac Os X 10.2
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.9
Apple Mac Os X Server 10.0
NA
CVE-2005-0970
Mac OS X 10.3.9 and previous versions allows users to install, create, and execute setuid/setgid scripts, contrary to the intended design, which may allow malicious users to conduct unauthorized activities with escalated privileges via vulnerable scripts.
Apple Mac Os X 10.1.2
Apple Mac Os X 10.1.3
Apple Mac Os X 10.1.4
Apple Mac Os X 10.1.5
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X 10.0
Apple Mac Os X 10.0.1
Apple Mac Os X 10.0.2
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.6
Apple Mac Os X 10.2.7
Apple Mac Os X 10.3.6
Apple Mac Os X 10.3.7
Apple Mac Os X 10.0.3
Apple Mac Os X 10.1
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.3
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »