Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 6.0.2 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2014-4455
dyld in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file.
Apple Iphone Os
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos
Apple Tvos 7.0.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.2
Apple Tvos 6.1.2
Apple Tvos 6.1.1
9.3
CVSSv2
CVE-2014-4461
The kernel in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2 does not properly validate IOSharedDataQueue object metadata, which allows malicious users to execute arbitrary code in a privileged context via a crafted application.
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Mac Os X 10.10.0
Apple Mac Os X 10.9.5
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.2
Apple Tvos 6.1.2
5.8
CVSSv2
CVE-2014-4462
WebKit, as used in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452.
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Tvos 6.2
Apple Tvos 6.1.2
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
2.9
CVSSv2
CVE-2014-4364
The 802.1X subsystem in Apple iOS prior to 8 and Apple TV prior to 7 does not require strong authentication methods, which allows remote malicious users to calculate credentials by offering LEAP authentication from a crafted Wi-Fi AP and then performing a cryptographic attack aga...
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
9.3
CVSSv2
CVE-2014-4380
The IOHIDFamily kernel extension in Apple iOS prior to 8 and Apple TV prior to 7 lacks proper bounds checking on write operations, which allows malicious users to execute arbitrary code in the kernel's context via a crafted application.
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Mac Os X
9.3
CVSSv2
CVE-2014-4388
IOKit in Apple iOS prior to 8 and Apple TV prior to 7 does not properly validate IODataQueue object metadata, which allows malicious users to execute arbitrary code in a privileged context via an application that provides crafted values in unspecified metadata fields, a different...
Apple Mac Os X
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
9.3
CVSSv2
CVE-2014-4389
Integer overflow in IOKit in Apple iOS prior to 8 and Apple TV prior to 7 allows malicious users to execute arbitrary code in a privileged context via an application that provides crafted API arguments.
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Mac Os X
6.8
CVSSv2
CVE-2014-4411
WebKit, as used in Apple iOS prior to 8 and Apple TV prior to 7, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE...
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Mac Os X
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1.2
Apple Tvos 6.1.1
9.3
CVSSv2
CVE-2014-4418
IOKit in Apple iOS prior to 8 and Apple TV prior to 7 does not properly validate IODataQueue object metadata, which allows malicious users to execute arbitrary code in a privileged context via an application that provides crafted values in unspecified metadata fields, a different...
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos
1.9
CVSSv2
CVE-2014-4419
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Mac Os X
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »