Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 8.0 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2016-4738
libxslt in Apple iOS prior to 10, OS X prior to 10.12, tvOS prior to 10, and watchOS prior to 3 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
Apple Watchos
Apple Tvos
Apple Iphone Os
Apple Mac Os X
Debian Debian Linux 8.0
Debian Debian Linux 9.0
9.3
CVSSv2
CVE-2016-1834
Heap-based buffer overflow in the xmlStrncat function in libxml2 prior to 2.9.4, as used in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memo...
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
Apple Tvos
Apple Iphone Os
Apple Mac Os X
Apple Watchos
Debian Debian Linux 8.0
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Tus 7.2
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Eus 7.4
Redhat Enterprise Linux Server Eus 7.3
Redhat Enterprise Linux Server Eus 7.2
Redhat Enterprise Linux Server Eus 7.5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Aus 7.2
Redhat Enterprise Linux Desktop 7.0
9.3
CVSSv2
CVE-2014-4461
The kernel in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2 does not properly validate IOSharedDataQueue object metadata, which allows malicious users to execute arbitrary code in a privileged context via a crafted application.
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Mac Os X 10.10.0
Apple Mac Os X 10.9.5
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.2
Apple Tvos 6.1.2
7.9
CVSSv2
CVE-2017-14315
In Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly v...
Apple Iphone Os 7.0
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.1.2
Apple Iphone Os 8.0
Apple Iphone Os 8.4.1
Apple Iphone Os 9.0
Apple Iphone Os 9.3.2
Apple Iphone Os 9.3.3
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os 9.0.1
Apple Iphone Os 9.0.2
Apple Iphone Os 9.3.4
Apple Iphone Os 9.3.5
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.6
Apple Iphone Os 8.1
Apple Iphone Os 8.1.2
Apple Iphone Os 9.1
7.8
CVSSv2
CVE-2015-1157
CoreText in Apple iOS 8.x up to and including 8.3 allows remote malicious users to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic c...
Apple Iphone Os 8.3
Apple Iphone Os 8.0
Apple Iphone Os 8.1.2
Apple Iphone Os 8.1
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.2
Apple Iphone Os 8.1.3
Apple Mac Os X
Apple Itunes
7.5
CVSSv2
CVE-2020-36328
A flaw was found in libwebp in versions prior to 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availabili...
Webmproject Libwebp
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Netapp Ontap Select Deploy Administration Utility -
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Apple Ipados 14.7
Apple Iphone Os 14.7
7.5
CVSSv2
CVE-2020-36329
A flaw was found in libwebp in versions prior to 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Webmproject Libwebp
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Netapp Ontap Select Deploy Administration Utility -
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Apple Iphone Os
Apple Ipados
7.5
CVSSv2
CVE-2016-9841
inffast.c in zlib 1.2.8 might allow context-dependent malicious users to have unspecified impact by leveraging improper pointer arithmetic.
Zlib Zlib
Opensuse Leap 42.2
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Debian Debian Linux 8.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Oracle Mysql
Oracle Database Server 18c
Oracle Jdk 1.8.0
Oracle Jdk 1.7.0
Oracle Jdk 1.6.0
Oracle Jre 1.6.0
Oracle Jre 1.8.0
Oracle Jre 1.7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Eus 7.4
1 Github repository
7.5
CVSSv2
CVE-2017-2518
An issue exists in certain Apple products. iOS prior to 10.3.2 is affected. macOS prior to 10.12.5 is affected. tvOS prior to 10.2.1 is affected. watchOS prior to 3.2.2 is affected. The issue involves the "SQLite" component. It allows remote malicious users to execute a...
Apple Tvos
Apple Watchos
Apple Iphone Os
Apple Mac Os X
Debian Debian Linux 8.0
1 Article
7.5
CVSSv2
CVE-2017-2519
An issue exists in certain Apple products. iOS prior to 10.3.2 is affected. macOS prior to 10.12.5 is affected. tvOS prior to 10.2.1 is affected. watchOS prior to 3.2.2 is affected. The issue involves the "SQLite" component. It allows remote malicious users to execute a...
Apple Iphone Os
Apple Tvos
Apple Watchos
Apple Mac Os X
Debian Debian Linux 8.0
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »