Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.6.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-3794
QuickTime in Apple Mac OS X 10.6.x prior to 10.6.5 accesses uninitialized memory locations during processing of FlashPix image data, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted FlashPix file.
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.0
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.3
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.6.3
Apple Mac Os X Server 10.6.2
NA
CVE-2010-3795
QuickTime in Apple Mac OS X 10.6.x prior to 10.6.5 accesses uninitialized memory locations during processing of GIF image data, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.3
Apple Mac Os X 10.6.0
Apple Mac Os X Server 10.6.2
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.6.3
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.6.1
NA
CVE-2012-3721
Profile Manager in Apple Mac OS X prior to 10.7.5 does not properly perform authentication for the Device Management private interface, which allows malicious users to enumerate managed devices via unspecified vectors.
Apple Mac Os X 10.4.11
Apple Mac Os X 10.6.1
Apple Mac Os X 10.2.0
Apple Mac Os X 10.3.0
Apple Mac Os X 10.4.10
Apple Mac Os X 10.4.1
Apple Mac Os X 10.6.7
Apple Mac Os X 10.6.0
Apple Mac Os X 10.5.3
Apple Mac Os X 10.6.4
Apple Mac Os X 10.5.5
Apple Mac Os X 10.4.3
Apple Mac Os X 10.0.0
Apple Mac Os X 10.3.8
Apple Mac Os X 10.4.9
Apple Mac Os X 10.2.3
Apple Mac Os X 10.2.4
Apple Mac Os X 10.7.3
Apple Mac Os X 10.5.4
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.6
Apple Mac Os X 10.0.2
NA
CVE-2011-3214
IOGraphics in Apple Mac OS X up to and including 10.6.8 does not properly handle a locked-screen state in display sleep mode for an Apple Cinema Display, which allows physically proximate malicious users to bypass the password requirement via unspecified vectors.
Apple Mac Os X 10.6.6
Apple Mac Os X Server 10.6.5
Apple Mac Os X Server 10.5.6
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.4.9
Apple Mac Os X Server 10.4.8
Apple Mac Os X Server 10.4.11
Apple Mac Os X Server 10.4.10
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.1.5
Apple Mac Os X Server 10.0.3
Apple Mac Os X Server 10.0.2
Apple Mac Os X Server 10.6.6
Apple Mac Os X 10.6.7
Apple Mac Os X Server 10.5.8
Apple Mac Os X Server 10.5.7
Apple Mac Os X Server 10.5.0
Apple Mac Os X Server 10.5
NA
CVE-2011-3217
MediaKit in Apple Mac OS X up to and including 10.6.8 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted disk image.
Apple Mac Os X Server 10.6.5
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.5.6
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.4.9
Apple Mac Os X Server 10.4.8
Apple Mac Os X Server 10.4.10
Apple Mac Os X
Apple Mac Os X Server 10.6.7
Apple Mac Os X Server 10.6.6
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.5.2
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.4.3
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.0
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.2.1
NA
CVE-2011-3218
The "Save for Web" selection in QuickTime Player in Apple Mac OS X up to and including 10.6.8 exports HTML documents that contain an http link to a script file, which allows man-in-the-middle malicious users to conduct cross-site scripting (XSS) attacks by spoofing the ...
Apple Mac Os X Server 10.6.7
Apple Mac Os X Server 10.6.6
Apple Mac Os X Server 10.6.5
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.5.4
Apple Mac Os X Server 10.4.8
Apple Mac Os X Server 10.4.7
Apple Mac Os X Server 10.4.10
Apple Mac Os X Server 10.4.1
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.1.5
Apple Mac Os X Server 10.1.4
Apple Mac Os X Server 10.1.3
Apple Mac Os X Server 10.0.2
Apple Mac Os X Server 10.0.1
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.0
Apple Mac Os X 10.5.1
NA
CVE-2011-3224
The User Documentation component in Apple Mac OS X up to and including 10.6.8 uses http sessions for updates to App Store help information, which allows man-in-the-middle malicious users to execute arbitrary code by spoofing the http server.
Apple Mac Os X 10.6.7
Apple Mac Os X 10.6.6
Apple Mac Os X Server 10.5.7
Apple Mac Os X Server 10.5.6
Apple Mac Os X Server 10.5
Apple Mac Os X Server 10.4.9
Apple Mac Os X Server 10.4.2
Apple Mac Os X Server 10.4.11
Apple Mac Os X Server 10.3.6
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.2.8
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.2.0
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.0.4
Apple Mac Os X Server 10.0.3
Apple Mac Os X 10.6.3
Apple Mac Os X 10.6.2
Apple Mac Os X 10.5.4
Apple Mac Os X 10.5.3
Apple Mac Os X 10.5.2
Apple Mac Os X 10.4.6
NA
CVE-2011-0224
CoreMedia in Apple Mac OS X up to and including 10.6.8 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted QuickTime movie file.
Apple Mac Os X
Apple Mac Os X Server 10.6.7
Apple Mac Os X Server 10.6.6
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.5.2
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.4.3
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.0
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.1.1
Apple Mac Os X Server 10.1.0
Apple Mac Os X Server 10.0
Apple Mac Os X 10.6.5
Apple Mac Os X 10.5.6
Apple Mac Os X 10.5.5
Apple Mac Os X 10.4.9
NA
CVE-2011-0229
Apple Type Services (ATS) in Apple Mac OS X up to and including 10.6.8 does not properly handle embedded Type 1 fonts, which allows remote malicious users to execute arbitrary code via a crafted document that triggers an out-of-bounds memory access.
Apple Mac Os X Server
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.6.3
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.5.4
Apple Mac Os X Server 10.4.7
Apple Mac Os X Server 10.4.6
Apple Mac Os X Server 10.4.1
Apple Mac Os X Server 10.4.0
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.2.4
Apple Mac Os X Server 10.1.4
Apple Mac Os X Server 10.1.3
Apple Mac Os X Server 10.0.1
Apple Mac Os X Server 10.0.0
Apple Mac Os X 10.6.0
Apple Mac Os X 10.5.8
Apple Mac Os X 10.5.1
Apple Mac Os X 10.5.0
NA
CVE-2014-4453
Apple iOS prior to 8.1.1 and OS X prior to 10.10.1 include location data during establishment of a Spotlight Suggestions server connection by Spotlight or Safari, which might allow remote malicious users to obtain sensitive information via unspecified vectors.
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Mac Os X
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.4
Apple Mac Os X 10.7.3
Apple Mac Os X 10.7.2
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.3
Apple Mac Os X 10.5.4
Apple Mac Os X 10.5.3
Apple Mac Os X 10.4.7
Apple Mac Os X 10.4.6
Apple Mac Os X 10.4.1
Apple Mac Os X 10.4.0
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.2
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.4
Apple Mac Os X 10.1.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-17519
open redirect
CVE-2024-21683
cache poisoning
CVE-2021-47524
CVE-2021-47521
CVE-2024-5229
CVE-2021-47560
local
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »