Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.8.1 vulnerabilities and exploits
(subscribe to this query)
1.9
CVSSv2
CVE-2013-5169
CoreGraphics in Apple Mac OS X prior to 10.9, when display-sleep mode is used, does not ensure that screen locking blocks the visibility of all windows, which allows physically proximate malicious users to obtain sensitive information by reading the screen.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.4
Apple Mac Os X
3.3
CVSSv2
CVE-2013-5171
CoreGraphics in Apple Mac OS X prior to 10.9 allows local users to bypass secure input mode and log an arbitrary application's keystrokes via a hotkey event registration.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.5
Apple Mac Os X
4.9
CVSSv2
CVE-2013-5174
Integer signedness error in the kernel in Apple Mac OS X prior to 10.9 allows local users to cause a denial of service (system crash) via a crafted tty read operation.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
Apple Mac Os X
6.6
CVSSv2
CVE-2013-5175
The kernel in Apple Mac OS X prior to 10.9 allows local users to obtain sensitive information or cause a denial of service (out-of-bounds read and system crash) via a crafted Mach-O file.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
4.9
CVSSv2
CVE-2013-5177
The kernel in Apple Mac OS X prior to 10.9 allows local users to cause a denial of service (panic) via an invalid iovec structure.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
7.5
CVSSv2
CVE-2013-5179
App Sandbox in Apple Mac OS X prior to 10.9 allows malicious users to bypass intended sandbox restrictions via a crafted app that uses the LaunchServices interface to specify process arguments.
Apple Mac Os X 10.8.0
Apple Mac Os X
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
4.3
CVSSv2
CVE-2013-5181
The auto-configuration feature in Mail in Apple Mac OS X prior to 10.9 selects plaintext authentication for unspecified servers that support CRAM-MD5 authentication, which allows remote malicious users to obtain sensitive information by sniffing the network.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X
5
CVSSv2
CVE-2013-5182
Mail in Apple Mac OS X prior to 10.9 allows remote malicious users to spoof the existence of a cryptographic signature for an e-mail message by using the multipart/signed content type within an unsigned message.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X
2.1
CVSSv2
CVE-2013-5186
Power Management in Apple Mac OS X prior to 10.9 does not properly handle the interaction between locking and power assertions, which allows physically proximate malicious users to obtain sensitive information by reading a screen that should have transitioned into the locked stat...
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X
4
CVSSv2
CVE-2013-5188
The Screen Lock implementation in Apple Mac OS X prior to 10.9, when hibernation and autologin are enabled, does not require a password for a transition out of hibernation, which allows physically proximate malicious users to obtain access by visiting an unattended workstation in...
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »