Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 8.0.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2014-4451
Apple iOS prior to 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate malicious users to bypass the lock-screen protection mechanism via a series of guesses.
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
7.5
CVSSv2
CVE-2014-4457
The Sandbox Profiles subsystem in Apple iOS prior to 8.1.1 does not properly implement the debugserver sandbox, which allows malicious users to bypass intended binary-execution restrictions via a crafted application that is run during a time period when debugging is not enabled.
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
2.1
CVSSv2
CVE-2014-4463
Apple iOS prior to 8.1.1 allows physically proximate malicious users to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime "Leave a Message" feature.
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
Apple Iphone Os 8.0.2
7.8
CVSSv2
CVE-2015-1157
CoreText in Apple iOS 8.x up to and including 8.3 allows remote malicious users to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic c...
Apple Iphone Os 8.3
Apple Iphone Os 8.0
Apple Iphone Os 8.1.2
Apple Iphone Os 8.1
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.2
Apple Iphone Os 8.1.3
Apple Mac Os X
Apple Itunes
7.9
CVSSv2
CVE-2017-14315
In Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly v...
Apple Iphone Os 7.0
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.1.2
Apple Iphone Os 8.0
Apple Iphone Os 8.4.1
Apple Iphone Os 9.0
Apple Iphone Os 9.3.2
Apple Iphone Os 9.3.3
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os 9.0.1
Apple Iphone Os 9.0.2
Apple Iphone Os 9.3.4
Apple Iphone Os 9.3.5
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.6
Apple Iphone Os 8.1
Apple Iphone Os 8.1.2
Apple Iphone Os 9.1
5.8
CVSSv2
CVE-2014-4462
WebKit, as used in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452.
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Tvos 6.2
Apple Tvos 6.1.2
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
9.3
CVSSv2
CVE-2014-4461
The kernel in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2 does not properly validate IOSharedDataQueue object metadata, which allows malicious users to execute arbitrary code in a privileged context via a crafted application.
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Mac Os X 10.10.0
Apple Mac Os X 10.9.5
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.2
Apple Tvos 6.1.2
9.3
CVSSv2
CVE-2013-1001
WebKit, as used in Apple iTunes prior to 11.0.3, allows man-in-the-middle malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVE...
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 5.1
Apple Iphone Os 5.1.1
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
9.3
CVSSv2
CVE-2013-1004
WebKit, as used in Apple iTunes prior to 11.0.3, allows man-in-the-middle malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVE...
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.3.2
9.3
CVSSv2
CVE-2013-1006
WebKit, as used in Apple iTunes prior to 11.0.3, allows man-in-the-middle malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVE...
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 5.1
Apple Iphone Os 5.1.1
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »