Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-1576
Mail in Apple Mac OS X prior to 10.5, when an IPv6 SMTP server is used, does not properly initialize memory, which might allow remote malicious users to execute arbitrary code or cause a denial of service (application crash), or obtain sensitive information (memory contents) in o...
Apple Mac Os X 10.3
Apple Mac Os X 10.4
Apple Mac Os X 10.0
Apple Mac Os X 10.1
Apple Mac Os X 10.2
NA
CVE-2005-0716
Stack-based buffer overflow in the Core Foundation Library in Mac OS X 10.3.5 and 10.3.6, and possibly earlier versions, allows local users to execute arbitrary code via a long CF_CHARSET_PATH environment variable.
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.3
Apple Mac Os X 10.3
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.6
Apple Mac Os X 10.3.6
Apple Mac Os X 10.3.7
Apple Mac Os X 10.3.8
Apple Mac Os X Server 10.3
Apple Mac Os X 10.3.2
Apple Mac Os X 10.3.4
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.3.4
2 EDB exploits
1 Article
NA
CVE-2005-0715
AFP Server in Mac OS X prior to 10.3.8 uses insecure permissions for "Drop Boxes," which allows local users to read the contents of a Drop Box.
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.3.5
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X Server 10.3.6
Apple Mac Os X Server 10.3.7
Apple Mac Os X 10.3.7
Apple Mac Os X 10.3.8
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.6
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.3.4
NA
CVE-2005-0713
The Bluetooth Setup Assistant for Mac OS X prior to 10.3.8 can be launched without a keyboard or Bluetooth device, which allows local users to bypass access restrictions and gain privileges.
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.7
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.7
Apple Mac Os X 10.3.8
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.2
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.6
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.6
1 EDB exploit
NA
CVE-2004-0824
PPPDialer for Mac OS X 10.2.8 up to and including 10.3.5 allows local users to overwrite system files via a symlink attack on PPPDialer log files.
Apple Mac Os X 10.3.2
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
1 EDB exploit
NA
CVE-2005-0975
Integer signedness error in the parse_machfile function in the mach-o loader (mach_loader.c) for the Darwin Kernel as used in Mac OS X 10.3.7, and other versions prior to 10.3.9, allows local users to cause a denial of service (CPU consumption) via a crafted mach-o header.
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.6
Apple Mac Os X Server 10.3.6
Apple Mac Os X Server 10.3.7
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.3.3
Apple Mac Os X 10.3
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Opendarwin Darwin Kernel 7.1
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.5
NA
CVE-2006-4407
The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize encryption ciphers when negotiating the strongest shared cipher, which causes Secure Transport to user a weaker cipher that makes it easier for remote malicious users to decrypt traffic.
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.6
Apple Mac Os X 10.3.7
Apple Mac Os X 10.3.2
Apple Mac Os X 10.3.3
NA
CVE-2005-1331
The AppleScript Editor in Mac OS X 10.3.9 does not properly display script code for an applescript: URI, which can result in code that is different than the actual code that would be run, which could allow remote malicious users to trick users into executing malicious code via ce...
Apple Applescript 2.0.0
Apple Mac Os X 10.3.2
Apple Mac Os X 10.3.3
Apple Mac Os X Server 10.3
Apple Mac Os X 10.3.6
Apple Mac Os X 10.3.7
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.9
Apple Mac Os X Server 10.3.7
Apple Mac Os X Server 10.3.8
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.6
NA
CVE-2005-1341
Apple Terminal 1.4.4 allows malicious users to execute arbitrary commands via terminal escape sequences.
Apple Terminal 1.4.4
Apple Mac Os X 10.3
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.9
Apple Mac Os X Server 10.3.6
Apple Mac Os X Server 10.3.7
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.3.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.9
Apple Mac Os X 10.3.6
Apple Mac Os X 10.3.7
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.5
NA
CVE-2005-1342
The x-man-page: URI handler for Apple Terminal 1.4.4 in Mac OS X 10.3.9 does not cleanse terminal escape sequences, which allows remote malicious users to execute arbitrary commands.
Apple Terminal 1.4.4
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X 10.3.6
Apple Mac Os X 10.3.7
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.9
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »