Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 6.0.2 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2013-3950
Stack-based buffer overflow in the openSharedCacheFile function in dyld.cpp in dyld in Apple iOS 5.1.x and 6.x up to and including 6.1.3 makes it easier for malicious users to conduct untethering attacks via a long string in the DYLD_SHARED_CACHE_DIR environment variable.
Apple Iphone Os 5.1
Apple Iphone Os 5.1.1
Apple Iphone Os 6.1.2
Apple Iphone Os 6.0.1
Apple Iphone Os 6.1.3
Apple Iphone Os 6.0.2
Apple Iphone Os 6.0
Apple Iphone Os 6.1
258
VMScore
CVE-2014-4364
The 802.1X subsystem in Apple iOS prior to 8 and Apple TV prior to 7 does not require strong authentication methods, which allows remote malicious users to calculate credentials by offering LEAP authentication from a crafted Wi-Fi AP and then performing a cryptographic attack aga...
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
187
VMScore
CVE-2014-4357
Accounts Framework in Apple iOS prior to 8 and Apple TV prior to 7 allows malicious users to obtain sensitive information by reading log data that was not intended to be present in a log.
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.1.2
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os
320
VMScore
CVE-2014-4372
syslogd in the syslog subsystem in Apple iOS prior to 8 and Apple TV prior to 7 allows local users to change the permissions of arbitrary files via a symlink attack on an unspecified file.
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0
Apple Tvos
Apple Tvos 6.1.2
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os
605
VMScore
CVE-2014-4422
The kernel in Apple iOS prior to 8 and Apple TV prior to 7 uses a predictable random number generator during the early portion of the boot process, which allows malicious users to bypass certain kernel-hardening protection mechanisms by using a user-space process to observe data ...
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
694
VMScore
CVE-2014-4369
The IOAcceleratorFamily API implementation in Apple iOS prior to 8 and Apple TV prior to 7 allows malicious users to cause a denial of service (NULL pointer dereference and device crash) via an application that uses crafted arguments.
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0
Apple Tvos
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
383
VMScore
CVE-2014-4383
The Assets subsystem in Apple iOS prior to 8 and Apple TV prior to 7 allows man-in-the-middle malicious users to spoof a device's update status via a crafted Last-Modified HTTP response header.
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos
828
VMScore
CVE-2014-4418
IOKit in Apple iOS prior to 8 and Apple TV prior to 7 does not properly validate IODataQueue object metadata, which allows malicious users to execute arbitrary code in a privileged context via an application that provides crafted values in unspecified metadata fields, a different...
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos
694
VMScore
CVE-2014-4373
The IntelAccelerator driver in the IOAcceleratorFamily subsystem in Apple iOS prior to 8 and Apple TV prior to 7 allows malicious users to cause a denial of service (NULL pointer dereference and device restart) via a crafted application.
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Mac Os X
606
VMScore
CVE-2014-4377
Integer overflow in CoreGraphics in Apple iOS prior to 8 and Apple TV prior to 7 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Mac Os X
2 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »