Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x 10.8.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-5167
CFNetwork in Apple Mac OS X prior to 10.9 does not properly support Safari's deletion of session cookies in response to a reset operation, which makes it easier for remote web servers to track users via Set-Cookie HTTP headers.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X
Apple Mac Os X 10.8.5
NA
CVE-2013-5168
Console in Apple Mac OS X prior to 10.9 allows user-assisted remote malicious users to execute arbitrary applications by triggering a log entry with a crafted attached URL.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.1
Apple Mac Os X
NA
CVE-2013-5169
CoreGraphics in Apple Mac OS X prior to 10.9, when display-sleep mode is used, does not ensure that screen locking blocks the visibility of all windows, which allows physically proximate malicious users to obtain sensitive information by reading the screen.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.4
Apple Mac Os X
NA
CVE-2013-5170
Buffer underflow in CoreGraphics in Apple Mac OS X prior to 10.9 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
NA
CVE-2013-5171
CoreGraphics in Apple Mac OS X prior to 10.9 allows local users to bypass secure input mode and log an arbitrary application's keystrokes via a hotkey event registration.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.5
Apple Mac Os X
NA
CVE-2013-5173
The random-number generator in the kernel in Apple Mac OS X prior to 10.9 provides lengthy exclusive access for processing of large requests, which allows local users to cause a denial of service (temporary generator outage) via an application that requires many random numbers.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
NA
CVE-2013-5174
Integer signedness error in the kernel in Apple Mac OS X prior to 10.9 allows local users to cause a denial of service (system crash) via a crafted tty read operation.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X 10.8.0
Apple Mac Os X
NA
CVE-2013-5175
The kernel in Apple Mac OS X prior to 10.9 allows local users to obtain sensitive information or cause a denial of service (out-of-bounds read and system crash) via a crafted Mach-O file.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
NA
CVE-2013-5176
The kernel in Apple Mac OS X prior to 10.9 does not properly handle integer values during unspecified tty device operations, which allows local users to cause a denial of service (system hang) by triggering a truncation error.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
NA
CVE-2013-5177
The kernel in Apple Mac OS X prior to 10.9 allows local users to cause a denial of service (panic) via an invalid iovec structure.
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »