Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple mac os x server 10.2.4 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2003-0049
Apple File Protocol (AFP) in Mac OS X prior to 10.2.4 allows administrators to log in as other users by using the administrator password.
Apple Mac Os X 10.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.2.3
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.2.2
409
VMScore
CVE-2011-3214
IOGraphics in Apple Mac OS X up to and including 10.6.8 does not properly handle a locked-screen state in display sleep mode for an Apple Cinema Display, which allows physically proximate malicious users to bypass the password requirement via unspecified vectors.
Apple Mac Os X 10.6.6
Apple Mac Os X Server 10.6.5
Apple Mac Os X Server 10.5.6
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.4.9
Apple Mac Os X Server 10.4.8
Apple Mac Os X Server 10.4.11
Apple Mac Os X Server 10.4.10
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.1.5
Apple Mac Os X Server 10.0.3
Apple Mac Os X Server 10.0.2
Apple Mac Os X Server 10.6.6
Apple Mac Os X 10.6.7
Apple Mac Os X Server 10.5.8
Apple Mac Os X Server 10.5.7
Apple Mac Os X Server 10.5.0
Apple Mac Os X Server 10.5
605
VMScore
CVE-2011-3217
MediaKit in Apple Mac OS X up to and including 10.6.8 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted disk image.
Apple Mac Os X Server 10.6.5
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.5.6
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.4.9
Apple Mac Os X Server 10.4.8
Apple Mac Os X Server 10.4.10
Apple Mac Os X
Apple Mac Os X Server 10.6.7
Apple Mac Os X Server 10.6.6
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.5.2
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.4.3
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.0
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.2.1
231
VMScore
CVE-2011-3218
The "Save for Web" selection in QuickTime Player in Apple Mac OS X up to and including 10.6.8 exports HTML documents that contain an http link to a script file, which allows man-in-the-middle malicious users to conduct cross-site scripting (XSS) attacks by spoofing the ...
Apple Mac Os X Server 10.6.7
Apple Mac Os X Server 10.6.6
Apple Mac Os X Server 10.6.5
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.5.4
Apple Mac Os X Server 10.4.8
Apple Mac Os X Server 10.4.7
Apple Mac Os X Server 10.4.10
Apple Mac Os X Server 10.4.1
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.1.5
Apple Mac Os X Server 10.1.4
Apple Mac Os X Server 10.1.3
Apple Mac Os X Server 10.0.2
Apple Mac Os X Server 10.0.1
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.0
Apple Mac Os X 10.5.1
605
VMScore
CVE-2011-0224
CoreMedia in Apple Mac OS X up to and including 10.6.8 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted QuickTime movie file.
Apple Mac Os X
Apple Mac Os X Server 10.6.7
Apple Mac Os X Server 10.6.6
Apple Mac Os X Server 10.6.1
Apple Mac Os X Server 10.6.0
Apple Mac Os X Server 10.5.2
Apple Mac Os X Server 10.5.1
Apple Mac Os X Server 10.4.4
Apple Mac Os X Server 10.4.3
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.3.8
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.0
Apple Mac Os X Server 10.2.2
Apple Mac Os X Server 10.2.1
Apple Mac Os X Server 10.1.1
Apple Mac Os X Server 10.1.0
Apple Mac Os X Server 10.0
Apple Mac Os X 10.6.5
Apple Mac Os X 10.5.6
Apple Mac Os X 10.5.5
Apple Mac Os X 10.4.9
605
VMScore
CVE-2011-0229
Apple Type Services (ATS) in Apple Mac OS X up to and including 10.6.8 does not properly handle embedded Type 1 fonts, which allows remote malicious users to execute arbitrary code via a crafted document that triggers an out-of-bounds memory access.
Apple Mac Os X Server
Apple Mac Os X Server 10.6.4
Apple Mac Os X Server 10.6.3
Apple Mac Os X Server 10.5.5
Apple Mac Os X Server 10.5.4
Apple Mac Os X Server 10.4.7
Apple Mac Os X Server 10.4.6
Apple Mac Os X Server 10.4.1
Apple Mac Os X Server 10.4.0
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.2.4
Apple Mac Os X Server 10.1.4
Apple Mac Os X Server 10.1.3
Apple Mac Os X Server 10.0.1
Apple Mac Os X Server 10.0.0
Apple Mac Os X 10.6.0
Apple Mac Os X 10.5.8
Apple Mac Os X 10.5.1
Apple Mac Os X 10.5.0
231
VMScore
CVE-2011-3224
The User Documentation component in Apple Mac OS X up to and including 10.6.8 uses http sessions for updates to App Store help information, which allows man-in-the-middle malicious users to execute arbitrary code by spoofing the http server.
Apple Mac Os X 10.6.7
Apple Mac Os X 10.6.6
Apple Mac Os X Server 10.5.7
Apple Mac Os X Server 10.5.6
Apple Mac Os X Server 10.5
Apple Mac Os X Server 10.4.9
Apple Mac Os X Server 10.4.2
Apple Mac Os X Server 10.4.11
Apple Mac Os X Server 10.3.6
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.2.8
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.2.0
Apple Mac Os X Server 10.2
Apple Mac Os X Server 10.0.4
Apple Mac Os X Server 10.0.3
Apple Mac Os X 10.6.3
Apple Mac Os X 10.6.2
Apple Mac Os X 10.5.4
Apple Mac Os X 10.5.3
Apple Mac Os X 10.5.2
Apple Mac Os X 10.4.6
187
VMScore
CVE-2012-3718
Apple Mac OS X prior to 10.7.5 and 10.8.x prior to 10.8.2 allows local users to read passwords entered into Login Window (aka LoginWindow) or Screen Saver Unlock by installing an input method that intercepts keystrokes.
Apple Mac Os X 10.5.6
Apple Mac Os X 10.6.4
Apple Mac Os X 10.5.5
Apple Mac Os X 10.7.2
Apple Mac Os X 10.3.9
Apple Mac Os X 10.3.8
Apple Mac Os X 10.4.9
Apple Mac Os X 10.4.8
Apple Mac Os X 10.7.3
Apple Mac Os X 10.5.4
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.2
Apple Mac Os X 10.1
Apple Mac Os X 10.5.2
Apple Mac Os X 10.4.11
Apple Mac Os X 10.5.1
Apple Mac Os X 10.1.0
Apple Mac Os X 10.3.0
Apple Mac Os X 10.4.10
Apple Mac Os X 10.7.0
935
VMScore
CVE-2013-0984
Directory Service in Apple Mac OS X up to and including 10.6.8 allows remote malicious users to execute arbitrary code or cause a denial of service (daemon crash) via a crafted message.
Apple Mac Os X 10.5.7
Apple Mac Os X 10.5.6
Apple Mac Os X 10.5.5
Apple Mac Os X 10.5.4
Apple Mac Os X 10.5.3
Apple Mac Os X 10.4.10
Apple Mac Os X 10.4.1
Apple Mac Os X 10.4.0
Apple Mac Os X 10.3.9
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.3
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.1
Apple Mac Os X 10.6.7
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.0
Apple Mac Os X 10.5.2
Apple Mac Os X 10.5.0
Apple Mac Os X 10.4.3
Apple Mac Os X 10.4.11
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.6
1 EDB exploit
668
VMScore
CVE-2012-0650
Buffer overflow in the DirectoryService Proxy in DirectoryService in Apple Mac OS X up to and including 10.6.8 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
Apple Mac Os X 10.6.3
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.0
Apple Mac Os X 10.4.5
Apple Mac Os X 10.4.4
Apple Mac Os X 10.4.3
Apple Mac Os X 10.4.2
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.0
Apple Mac Os X 10.2.8
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.6
Apple Mac Os X 10.0.4
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.2
Apple Mac Os X 10.0.1
Apple Mac Os X 10.5.4
Apple Mac Os X 10.5.3
Apple Mac Os X 10.5.2
Apple Mac Os X 10.5.1
Apple Mac Os X 10.3.9
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »