Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.8.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-5191
The syslog implementation in Apple Mac OS X prior to 10.9 allows local users to obtain sensitive information by leveraging access to the Guest account and reading console-log messages from previous Guest sessions.
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
NA
CVE-2013-5166
The Bluetooth USB host controller in Apple Mac OS X prior to 10.9 prematurely deletes interfaces, which allows local users to cause a denial of service (system crash) via a crafted application.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.4
Apple Mac Os X
NA
CVE-2013-5167
CFNetwork in Apple Mac OS X prior to 10.9 does not properly support Safari's deletion of session cookies in response to a reset operation, which makes it easier for remote web servers to track users via Set-Cookie HTTP headers.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X
Apple Mac Os X 10.8.5
NA
CVE-2013-5168
Console in Apple Mac OS X prior to 10.9 allows user-assisted remote malicious users to execute arbitrary applications by triggering a log entry with a crafted attached URL.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X
NA
CVE-2013-5169
CoreGraphics in Apple Mac OS X prior to 10.9, when display-sleep mode is used, does not ensure that screen locking blocks the visibility of all windows, which allows physically proximate malicious users to obtain sensitive information by reading the screen.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.4
Apple Mac Os X
NA
CVE-2013-5170
Buffer underflow in CoreGraphics in Apple Mac OS X prior to 10.9 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
NA
CVE-2013-5174
Integer signedness error in the kernel in Apple Mac OS X prior to 10.9 allows local users to cause a denial of service (system crash) via a crafted tty read operation.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
Apple Mac Os X
NA
CVE-2013-5175
The kernel in Apple Mac OS X prior to 10.9 allows local users to obtain sensitive information or cause a denial of service (out-of-bounds read and system crash) via a crafted Mach-O file.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
NA
CVE-2013-5177
The kernel in Apple Mac OS X prior to 10.9 allows local users to cause a denial of service (panic) via an invalid iovec structure.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
NA
CVE-2013-5180
The srandomdev function in Libc in Apple Mac OS X prior to 10.9, when the kernel random-number generator is unavailable, produces predictable values instead of the intended random values, which makes it easier for context-dependent malicious users to defeat cryptographic protecti...
Apple Mac Os X 10.8.1
Apple Mac Os X
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »