Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 3.0 vulnerabilities and exploits
(subscribe to this query)
4.8
CVSSv3
CVE-2010-1776
Find My iPhone on iOS 2.0 up to and including 3.1.3 for iPhone 3G and later and iOS 2.1 up to and including 3.1.3 for iPod touch (2nd generation) and later, when Find My iPhone is disabled, allows remote authenticated users with an associated MobileMe account to wipe the device.
Apple Iphone Os 3.0
Apple Iphone Os 3.1.3
Apple Iphone Os 2.2
Apple Iphone Os 3.1.2
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2.1
NA
CVE-2009-2794
The Exchange Support component in Apple iPhone OS prior to 3.1, and iPhone OS prior to 3.1.1 for iPod touch, does not properly implement the "Maximum inactivity time lock" functionality, which allows local users to bypass intended Microsoft Exchange restrictions by choo...
Apple Iphone Os 2.0.2
Apple Iphone Os 3.0
Apple Iphone Os 2.2
Apple Iphone Os 3.0.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.1
Apple Iphone Os 2.2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0
NA
CVE-2009-2207
The MobileMail component in Apple iPhone OS 3.0 and 3.0.1, and iPhone OS 3.0 for iPod touch, lists deleted e-mail messages in Spotlight search results, which might allow local users to obtain sensitive information by reading these messages.
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
NA
CVE-2009-2796
The UIKit component in Apple iPhone OS 3.0, and iPhone OS 3.0.1 for iPod touch, allows physically proximate malicious users to discover a password by watching a user undo deletions of characters in the password.
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
NA
CVE-2010-1407
WebKit in Apple iOS prior to 4 on the iPhone and iPod touch does not properly implement the history.replaceState method in certain situations involving IFRAME elements, which allows remote malicious users to obtain sensitive information via a crafted HTML document.
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
NA
CVE-2010-1775
Race condition in Passcode Lock in Apple iOS prior to 4 on the iPhone and iPod touch allows physically proximate malicious users to bypass intended passcode requirements, and pair a locked device with a computer and access arbitrary data, via vectors involving the initial boot.
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
NA
CVE-2009-2815
The Telephony component in Apple iPhone OS prior to 3.1 does not properly handle SMS arrival notifications, which allows remote malicious users to cause a denial of service (NULL pointer dereference and service interruption) via a crafted SMS message.
Apple Iphone Os 3.0
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0
Apple Iphone Os 2.2
Apple Iphone Os
Apple Iphone Os 1.1.1
Apple Iphone Os 2.0.0
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1
Apple Iphone Os 1.1.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.1
Apple Iphone Os 1.1.5
Apple Iphone Os 2.1.1
Apple Iphone Os 1.1.4
Apple Iphone Os 1.0.0
Apple Iphone Os 2.0.2
Apple Iphone Os 2.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.2.1
NA
CVE-2011-3426
Cross-site scripting (XSS) vulnerability in Safari in Apple iOS prior to 5 allows remote web servers to inject arbitrary web script or HTML via a file accompanied by a "Content-Disposition: attachment" HTTP header.
Apple Iphone Os 4.0
Apple Iphone Os 4.3.2
Apple Iphone Os 4.0.2
Apple Iphone Os 4.0.1
Apple Iphone Os 3.2
Apple Iphone Os 4.2.8
Apple Iphone Os 4.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.5
Apple Iphone Os 3.1.3
Apple Iphone Os 4.3.1
Apple Iphone Os 4.2.5
Apple Iphone Os 3.2.1
Apple Iphone Os 3.1
Apple Iphone Os 4.2.1
Apple Iphone Os 3.0
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.0
Apple Iphone Os 3.2.2
NA
CVE-2011-3429
The Settings component in Apple iOS prior to 5 stores a cleartext parental-restrictions passcode in an unspecified file, which might allow physically proximate malicious users to obtain sensitive information by reading this file.
Apple Iphone Os 4.0
Apple Iphone Os 4.3.2
Apple Iphone Os 4.0.2
Apple Iphone Os 4.0.1
Apple Iphone Os 3.2
Apple Iphone Os 4.2.8
Apple Iphone Os 4.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.5
Apple Iphone Os 3.1.3
Apple Iphone Os 4.3.1
Apple Iphone Os 4.2.5
Apple Iphone Os 3.2.1
Apple Iphone Os 3.1
Apple Iphone Os 4.2.1
Apple Iphone Os 3.0
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.0
Apple Iphone Os 3.2.2
NA
CVE-2011-3430
The Settings component in Apple iOS prior to 5, when a configuration profile is used for a locale other than English, does not properly implement localization, which makes it easier for malicious users to have an unspecified impact by leveraging incorrect configuration display.
Apple Iphone Os 4.0
Apple Iphone Os 4.3.2
Apple Iphone Os 4.0.2
Apple Iphone Os 4.0.1
Apple Iphone Os 3.2
Apple Iphone Os 4.2.8
Apple Iphone Os 4.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.5
Apple Iphone Os 3.1.3
Apple Iphone Os 4.3.1
Apple Iphone Os 4.2.5
Apple Iphone Os 3.2.1
Apple Iphone Os 3.1
Apple Iphone Os 4.2.1
Apple Iphone Os 3.0
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.0
Apple Iphone Os 3.2.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »