Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,825
With exploit
apple / mac_os_x_server
You can search for specific versions with
https://synscan.net/product/mac_os_x_server/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2012-0649
Medium
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0651
Medium
May 11, 2012
== 10.6.8
CVE-2012-0654
Medium
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0655
Medium
May 11, 2012
<= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2011-3026
Medium
Feb 16, 2012
== 10.6.8
>= 10.7.0 < 10.7.5
CVE-2011-3444
Low
Feb 2, 2012
<= 10.7.2
== 10.7.0
== 10.7.1
CVE-2011-3446
High
Feb 2, 2012
<= 10.7.2
== 10.7.0
== 10.7.1
CVE-2011-3447
Low
Feb 2, 2012
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2011-3448
Medium
Feb 2, 2012
<= 10.7.2
== 10.7.1
== 10.6.3
== 10.6.8
== 10.6.6
== 10.6.4
== 10.6.7
== 10.6.5
== 10.7.0
== 10.6.1
== 10.6.2
== 10.6.0
CVE-2011-3449
Medium
Feb 2, 2012
<= 10.7.2
== 10.7.0
== 10.7.1
‹
›
‹
1
2
...
5
6
7
...
65
66
›