Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
iphoto vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2008-0043
Format string vulnerability in Apple iPhoto prior to 7.1.2 allows remote malicious users to execute arbitrary code via photocast subscriptions.
Apple Iphoto
685
VMScore
CVE-2007-0051
Format string vulnerability in Apple iPhoto 6.0.5 (316), and other versions prior to 6.0.6, allows remote user-assisted malicious users to execute arbitrary code via a crafted photocast with format string specifiers in the title of an RSS iPhoto feed.
Apple Iphoto 6.0.5
1 EDB exploit
685
VMScore
CVE-2007-0645
Format string vulnerability in iPhoto 6.0.5 allows remote user-assisted malicious users to cause a denial of service (crash) via format string specifiers in a filename, which is not properly handled when calling certain Apple AppKit functions.
Apple Iphoto 6.0.5
1 EDB exploit
755
VMScore
CVE-2008-0830
The Digital Photo Access Protocol (DPAP) server for iPhoto 4.0.3 allows remote malicious users to cause a denial of service (crash) via a malformed dpap: URI, a different vulnerability than CVE-2008-0043.
Apple Iphoto 4.0.3
1 EDB exploit
605
VMScore
CVE-2008-0987
Stack-based buffer overflow in Image Raw in Apple Mac OS X 10.5.2, and Digital Camera RAW Compatibility before Update 2.0 for Aperture 2 and iPhoto 7.1.2, allows remote malicious users to execute arbitrary code via a crafted Adobe Digital Negative (DNG) image.
Apple Aperture 2
Apple Iphoto 7.1.2
454
VMScore
CVE-2006-0392
Buffer overflow in Apple Mac OS X 10.4.7 allows user-assisted malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Canon RAW image.
Apple Mac Os X 10.4.7
Apple Mac Os X Server 10.4.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started