Vulnerability Database

With exploit

apple / mac_os_x_server

Title Severity Exploit Date Affected Version
CVE-2012-3719 Medium Sep 20, 2012 <= 10.7.4
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
== 10.7.3
CVE-2012-3722 Medium Sep 20, 2012 <= 10.7.4
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
== 10.7.3
CVE-2012-3723 Low Sep 20, 2012 <= 10.7.4
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
== 10.7.3
CVE-2012-0649 Medium May 11, 2012 <= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0651 Medium May 11, 2012 == 10.6.8
CVE-2012-0654 Medium May 11, 2012 <= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0655 Medium May 11, 2012 <= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0657 Low May 11, 2012 <= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0658 Medium May 11, 2012 <= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2
CVE-2012-0659 Medium May 11, 2012 <= 10.7.3
== 10.0
== 10.0.0
== 10.0.1
== 10.0.2
== 10.0.3
== 10.0.4
== 10.1
== 10.1.0
== 10.1.1
== 10.1.2
== 10.1.3
== 10.1.4
== 10.1.5
== 10.2
== 10.2.0
== 10.2.1
== 10.2.2
== 10.2.3
== 10.2.4
== 10.2.5
== 10.2.6
== 10.2.7
== 10.2.8
== 10.3
== 10.3.0
== 10.3.1
== 10.3.2
== 10.3.3
== 10.3.4
== 10.3.5
== 10.3.6
== 10.3.7
== 10.3.8
== 10.3.9
== 10.4
== 10.4.0
== 10.4.1
== 10.4.10
== 10.4.11
== 10.4.2
== 10.4.3
== 10.4.4
== 10.4.5
== 10.4.6
== 10.4.7
== 10.4.8
== 10.4.9
== 10.5
== 10.5.0
== 10.5.1
== 10.5.2
== 10.5.3
== 10.5.4
== 10.5.5
== 10.5.6
== 10.5.7
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
== 10.6.5
== 10.6.6
== 10.6.7
== 10.6.8
== 10.7.0
== 10.7.1
== 10.7.2