Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.7.3 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2011-3462
Time Machine in Apple Mac OS X prior to 10.7.3 does not verify the unique identifier of its remote AFP volume or Time Capsule, which allows remote malicious users to obtain sensitive information contained in new backups by spoofing this storage object, a different vulnerability t...
Apple Mac Os X 10.7.1
Apple Mac Os X
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.7.0
Apple Mac Os X Server 10.7.1
Apple Mac Os X Server
641
VMScore
CVE-2011-3463
WebDAV Sharing in Apple Mac OS X 10.7.x prior to 10.7.3 does not properly perform authentication, which allows local users to gain privileges by leveraging access to (1) the server or (2) a bound directory.
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.7.1
Apple Mac Os X 10.7.2
Apple Mac Os X Server 10.7.2
Apple Mac Os X 10.7.1
Apple Mac Os X Server 10.7.0
605
VMScore
CVE-2011-3448
Heap-based buffer overflow in CoreMedia in Apple Mac OS X prior to 10.7.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding.
Apple Mac Os X Server 10.7.1
Apple Mac Os X
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.6
Apple Mac Os X 10.6.8
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.6.6
Apple Mac Os X 10.6.0
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.3
Apple Mac Os X Server 10.6.8
Apple Mac Os X 10.7.1
Apple Mac Os X 10.7.0
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.2
Apple Mac Os X Server 10.6.3
Apple Mac Os X Server 10.7.0
Apple Mac Os X Server
Apple Mac Os X 10.6.5
Apple Mac Os X 10.6.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5