Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,825
With exploit
apple / mac_os_x_server
You can search for specific versions with
https://synscan.net/product/mac_os_x_server/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2012-3716
High
Sep 20, 2012
== 10.7.0
== 10.7.1
== 10.7.2
== 10.7.3
== 10.7.4
CVE-2012-3718
Low
Sep 20, 2012
<= 10.7.4
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
== 10.7.3
CVE-2012-3719
Medium
Sep 20, 2012
<= 10.7.4
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
== 10.7.3
CVE-2012-0657
Low
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0658
Medium
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0659
Medium
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0660
Medium
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0661
Medium
May 11, 2012
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0662
High
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0675
Low
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
‹
›
‹
1
2
3
4
5
6
...
65
66
›